Haichang Gao
Orcid: 0000-0002-4969-5718
According to our database1,
Haichang Gao
authored at least 65 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Ind. Informatics, November, 2024
Mach. Learn., April, 2024
IEEE Trans. Dependable Secur. Comput., 2024
J. Inf. Secur. Appl., 2024
Mining Glitch Tokens in Large Language Models via Gradient-based Discrete Optimization.
CoRR, 2024
CoRR, 2024
Adversarial Machine Learning for Detecting Advanced Threats Inspired by StuxNet in Critical Infrastructure Networks.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the International Joint Conference on Neural Networks, 2024
2023
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
IEEE Trans. Computers, December, 2023
Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT.
IEEE Internet Things J., August, 2023
Neurocomputing, June, 2023
Neurocomputing, April, 2023
IEEE Trans. Dependable Secur. Comput., 2023
ACM Comput. Surv., 2023
Proceedings of the Artificial Neural Networks and Machine Learning, 2023
2022
IET Inf. Secur., 2022
Lower Difficulty and Better Robustness: A Bregman Divergence Perspective for Adversarial Training.
CoRR, 2022
Alleviating Robust Overfitting of Adversarial Training With Consistency Regularization.
CoRR, 2022
Consistency Regularization Helps Mitigate Robust Overfitting in Adversarial Training.
Proceedings of the Knowledge Science, Engineering and Management, 2022
2021
IEEE Trans. Image Process., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Int. J. Pattern Recognit. Artif. Intell., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Feature Pooling - A Feature Compression Method Used in Convolutional Neural Networks.
J. Inf. Sci. Eng., 2020
WordChange: Adversarial Examples Generation Approach for Chinese Text Classification.
IEEE Access, 2020
2019
J. Inf. Sci. Eng., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Is Satellite Image Target Camouflage Still Valid Under Deep Learning Target Detection?
Proceedings of the ICAIP 2019: 3rd International Conference on Advances in Image Processing, 2019
2018
Research on Deep Learning Techniques in Breaking Text-Based Captchas and Designing Image-Based Captcha.
IEEE Trans. Inf. Forensics Secur., 2018
Proceedings of the 2nd International Conference on Advances in Artificial Intelligence, 2018
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the Computer Vision - Second CCF Chinese Conference, 2017
2016
Robustness of text-based completely automated public turing test to tell computers and humans apart.
IET Inf. Secur., 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Int. J. Inf. Comput. Secur., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
J. Comput. Sci. Technol., 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
2010
Can Background Baroque Music Help to Improve the Memorability of Graphical Passwords?
Proceedings of the Image Analysis and Recognition, 7th International Conference, 2010
Proceedings of the 2010 International Conference on CyberWorlds, 2010
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010
Proceedings of the 9th ACM International Conference on Image and Video Retrieval, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Fifth International Conference on Image and Graphics, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
2008
Proceedings of the Fourth International Conference on Natural Computation, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2006
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006