2024
ESB-FL: Efficient and Secure Blockchain-Based Federated Learning With Fair Payment.
IEEE Trans. Big Data, December, 2024
Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score.
Cogn. Comput., November, 2024
Robust and privacy-preserving collaborative training: a comprehensive survey.
Artif. Intell. Rev., July, 2024
The Illusion of Visual Security: Reconstructing Perceptually Encrypted Images.
IEEE Trans. Circuits Syst. Video Technol., May, 2024
An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks.
IEEE Trans. Computers, March, 2024
Contrast-Then-Approximate: Analyzing Keyword Leakage of Generative Language Models.
IEEE Trans. Inf. Forensics Secur., 2024
Efficient Group Key Generation Based on Satellite Cluster State Information for Drone Swarm.
IEEE Trans. Inf. Forensics Secur., 2024
HQ-Net: A heatmap-based query backbone for point cloud understanding.
Neurocomputing, 2024
CompleteDT: Point cloud completion with information-perception transformers.
Neurocomputing, 2024
Preventing Non-intrusive Load Monitoring Privacy Invasion: A Precise Adversarial Attack Scheme for Networked Smart Meters.
CoRR, 2024
TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability.
CoRR, 2024
Beware of Road Markings: A New Adversarial Patch Attack to Monocular Depth Estimation.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
EvilEdit: Backdooring Text-to-Image Diffusion Models in One Second.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
AutoSched: An Adaptive Self-configured Framework for Scheduling Deep Learning Training Workloads.
Proceedings of the 38th ACM International Conference on Supercomputing, 2024
You Only Query Once: An Efficient Label-Only Membership Inference Attack.
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Fingerprinting Image-to-Image Generative Adversarial Networks.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Protecting Confidential Virtual Machines from Hardware Performance Counter Side Channels.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
A novel noise-robustness and rotation-invariant LADAR point cloud target classification method.
Eng. Appl. Artif. Intell., November, 2023
EHNQ: Subjective and Objective Quality Evaluation of Enhanced Night-Time Images.
IEEE Trans. Circuits Syst. Video Technol., September, 2023
Automatic Transformation Search Against Deep Leakage From Gradients.
IEEE Trans. Pattern Anal. Mach. Intell., September, 2023
Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework.
ACM Trans. Intell. Syst. Technol., August, 2023
Secure Decentralized Image Classification With Multiparty Homomorphic Encryption.
IEEE Trans. Circuits Syst. Video Technol., July, 2023
Efficient Top-k Matching for Publish/Subscribe Ride Hitching.
IEEE Trans. Knowl. Data Eng., April, 2023
BMIF: Privacy-preserving Blockchain-based Medical Image Fusion.
ACM Trans. Multim. Comput. Commun. Appl., February, 2023
Erase and Repair: An Efficient Box-Free Removal Attack on High-Capacity Deep Hiding.
IEEE Trans. Inf. Forensics Secur., 2023
Rethinking Adversarial Training with Neural Tangent Kernel.
CoRR, 2023
Towards the Vulnerability of Watermarking Artificial Intelligence Generated Content.
CoRR, 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023
Smaller Is Bigger: Rethinking the Embedding Rate of Deep Hiding.
CoRR, 2023
Contrastive Fusion Representation: Mitigating Adversarial Attacks on VQA Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Extracting Robust Models with Uncertain Examples.
Proceedings of the Eleventh International Conference on Learning Representations, 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator.
Proceedings of the International Conference on Field Programmable Technology, 2023
Text Classification via Large Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
2022
ELAA: An efficient local adversarial attack using model interpreters.
Int. J. Intell. Syst., December, 2022
EGM: An Efficient Generative Model for Unrestricted Adversarial Examples.
ACM Trans. Sens. Networks, November, 2022
Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data.
IEEE Trans. Serv. Comput., 2022
Ownership Verification of DNN Architectures via Hardware Cache Side Channels.
IEEE Trans. Circuits Syst. Video Technol., 2022
Byzantine-Resilient Decentralized Stochastic Gradient Descent.
IEEE Trans. Circuits Syst. Video Technol., 2022
Topology-Aware Differential Privacy for Decentralized Image Classification.
IEEE Trans. Circuits Syst. Video Technol., 2022
DPG-Net: Densely progressive-growing network for point cloud completion.
Neurocomputing, 2022
CTpoint: A novel local and global features extractor for point cloud.
Neurocomputing, 2022
Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption.
CoRR, 2022
CompleteDT: Point Cloud Completion with Dense Augment Inference Transformers.
CoRR, 2022
Threats to Pre-trained Language Models: Survey and Taxonomy.
CoRR, 2022
Triggerless Backdoor Attack for NLP Tasks with Clean Labels.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
A Blockchain-Based Mutual Authentication Protocol for Smart Home.
Proceedings of the Information Security - 25th International Conference, 2022
NASPY: Automated Extraction of Automated Machine Learning Models.
Proceedings of the Tenth International Conference on Learning Representations, 2022
BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models.
Proceedings of the Tenth International Conference on Learning Representations, 2022
2021
Onboard Real-Time Dense Reconstruction in Large Terrain Scene Using Embedded UAV Platform.
Remote. Sens., 2021
Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey.
CoRR, 2021
Protecting Your NLG Models with Semantic and Robust Watermarks.
CoRR, 2021
CT-block: a novel local and global features extractor for point cloud.
CoRR, 2021
Triggerless Backdoor Attack for NLP Tasks with Clean Labels.
CoRR, 2021
A Stealthy and Robust Fingerprinting Scheme for Generative Models.
CoRR, 2021
PEEL: A Provable Removal Attack on Deep Hiding.
CoRR, 2021
When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels.
CoRR, 2021
Local Black-box Adversarial Attacks: A Query Efficient Approach.
CoRR, 2021
PRNet: A Progressive Recovery Network for Revealing Perceptually Encrypted Images.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Privacy-Preserving Collaborative Learning With Automatic Transformation Search.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021
Temporal Watermarks for Deep Reinforcement Learning Models.
Proceedings of the AAMAS '21: 20th International Conference on Autonomous Agents and Multiagent Systems, 2021
Stealing Deep Reinforcement Learning Models for Fun and Profit.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Blind Night-Time Image Quality Assessment: Subjective and Objective Approaches.
IEEE Trans. Multim., 2020
PEID: A Perceptually Encrypted Image Database for Visual Security Evaluation.
IEEE Trans. Inf. Forensics Secur., 2020
Visual Security Evaluation of Perceptually Encrypted Images Based on Image Importance.
IEEE Trans. Circuits Syst. Video Technol., 2020
SensIR: Towards privacy-sensitive image retrieval in the cloud.
Signal Process. Image Commun., 2020
The Hidden Vulnerability of Watermarking for Deep Neural Networks.
CoRR, 2020
Differentially Private Decentralized Learning.
CoRR, 2020
vCBIR: A Verifiable Search Engine for Content-Based Image Retrieval.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
2019
Towards efficient privacy-preserving face recognition in the cloud.
Signal Process., 2019
ImageProof: Enabling Authentication for Large-Scale Image Retrieval.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
2018
Efficient biometric identity-based encryption.
Inf. Sci., 2018
2017
Image quality assessment based on multiscale fuzzy gradient similarity deviation.
Soft Comput., 2017
Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding.
Int. J. Bifurc. Chaos, 2017
2016
Perceptual Visual Security Index Based on Edge and Texture Similarities.
IEEE Trans. Inf. Forensics Secur., 2016
Processing secure, verifiable and efficient SQL over outsourced database.
Inf. Sci., 2016