Chunyi Zhou

Orcid: 0009-0008-6524-8142

According to our database1, Chunyi Zhou authored at least 21 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
M$^{3}$ANet: Multi-Modal and Multi-Attention Fusion Network for Ship License Plate Recognition.
IEEE Trans. Multim., 2024

Multiscale Sea-Land Segmentation Networks for Weak Boundaries.
IEEE Trans. Geosci. Remote. Sens., 2024

"No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks.
CoRR, 2024

CAMH: Advancing Model Hijacking Attack in Machine Learning.
CoRR, 2024

Enhancing Adversarial Transferability with Adversarial Weight Tuning.
CoRR, 2024

TruVRF: Towards Triple-Granularity Verification on Machine Unlearning.
CoRR, 2024

Decaf: Data Distribution Decompose Attack against Federated Learning.
CoRR, 2024

Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective.
CoRR, 2024

A Stealthy Backdoor Attack for Without-Label-Sharing Split Learning.
CoRR, 2024

How to Train a Backdoor-Robust Model on a Poisoned Dataset without Auxiliary Data?
CoRR, 2024

Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects.
CoRR, 2024

A Merge Sort Based Ranking System for the Evaluation of Large Language Models.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2024

2023
PPA: Preference Profiling Attack Against Federated Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2021
Central Banking after the Great Recession in U.S.: a new normal?
Proceedings of the ICEBT 2021: 5th International Conference on E-Education, E-Business and E-Technology, Beijing, China, June 18, 2021

2020
Privacy-Preserving Federated Learning in Fog Computing.
IEEE Internet Things J., 2020

An Efficient and Secure Data Integrity Auditing Scheme with Traceability for Cloud-Based EMR.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Privacy-Preserving and Verifiable Federated Learning Scheme.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Conversational Music Recommendation based on Bandits.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020

2018
Recommendation for MOOC with Learner Neighbors and Learning Series.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

MusicRoBot: Towards Conversational Context-Aware Music Recommender System.
Proceedings of the Database Systems for Advanced Applications, 2018


  Loading...