Chunyang Qi

Orcid: 0000-0001-6381-3859

According to our database1, Chunyang Qi authored at least 18 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SecureNet: Proactive intellectual property protection and model security defense for DNNs based on backdoor learning.
Neural Networks, 2024

SecureEI: Proactive intellectual property protection of AI models for edge intelligence.
Comput. Networks, 2024

Proactive Privacy and Intellectual Property Protection of Multimedia Retrieval Models in Edge Intelligence.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024

2023
Compromise privacy in large-batch Federated Learning via model poisoning.
Inf. Sci., November, 2023

Modeling and Analysis of Malware Propagation for IoT Heterogeneous Devices.
IEEE Syst. J., September, 2023

An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay.
PeerJ Comput. Sci., 2023

2022
A Novel Backdoor Attack Adapted to Transfer Learning.
Proceedings of the IEEE Smartworld, 2022

Compromise Privacy in Large-Batch Federated Learning via Malicious Model Parameters.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model.
Proceedings of the IEEE Global Communications Conference, 2022

2021
A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs.
Wirel. Commun. Mob. Comput., 2021

Malware homology determination using visualized images and feature fusion.
PeerJ Comput. Sci., 2021

MCTA: Mobile-Coverage Scheme Based on Trust-Aware for Hybrid WSNs.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Unsupervised Monocular Depth Estimation Method Based on Uncertainty Analysis and Retinex Algorithm.
Sensors, 2020

Defending pollution attacks in network coding enabled wireless <i>ad hoc</i> networks: a game-theoretic framework.
IET Commun., 2020

A Novel Mobile-Coverage Scheme for Hybrid Sensor Networks.
IEEE Access, 2020

Modeling and Analysis of Malware Propagation for Cluster-based Wireless Sensor Networks.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020

FDI: A Fast IoT Device Identification Approach.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Novel Lightweight Cryptography Scheme Based on Standardized IOT Data.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020


  Loading...