Khoa D. Doan

Orcid: 0000-0002-1610-8206

According to our database1, Khoa D. Doan authored at least 41 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions.
Eng. Appl. Artif. Intell., January, 2024

Towards Clean-Label Backdoor Attacks in the Physical World.
CoRR, 2024

Flatness-aware Sequential Learning Generates Resilient Backdoors.
CoRR, 2024

Less is More: Sparse Watermarking in LLMs with Enhanced Text Quality.
CoRR, 2024

Overcoming Catastrophic Forgetting in Federated Class-Incremental Learning via Federated Global Twin Generator.
CoRR, 2024

MetaLLM: A High-performant and Cost-efficient Dynamic Framework for Wrapping LLMs.
CoRR, 2024

Wicked Oddities: Selectively Poisoning for Effective Clean-Label Backdoor Attacks.
CoRR, 2024

Non-Cooperative Backdoor Attacks in Federated Learning: A New Threat Landscape.
CoRR, 2024

Venomancer: Towards Imperceptible and Target-on-Demand Backdoor Attacks in Federated Learning.
CoRR, 2024

Forget but Recall: Incremental Latent Rectification in Continual Learning.
CoRR, 2024

Composite Concept Extraction through Backdooring.
CoRR, 2024

Cold-start Recommendation by Personalized Embedding Region Elicitation.
CoRR, 2024

Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

Data Poisoning Quantization Backdoor Attack.
Proceedings of the Computer Vision - ECCV 2024, 2024

Fooling the Textual Fooler via Randomizing Latent Representations.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Synthesizing Physical Backdoor Datasets: An Automated Framework Leveraging Deep Generative Models.
CoRR, 2023

Fooling the Textual Fooler via Randomizing Latent Representations.
CoRR, 2023

Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks.
CoRR, 2023

Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack.
CoRR, 2023

A Cosine Similarity-based Method for Out-of-Distribution Detection.
CoRR, 2023

Asymmetric Hashing for Fast Ranking via Neural Network Measures.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

IBA: Towards Irreversible Backdoor Attacks in Federated Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Empirical Study of Federated Unlearning: Efficiency and Effectiveness.
Proceedings of the Asian Conference on Machine Learning, 2023

Defending Backdoor Attacks on Vision Transformer via Patch Processing.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
CoopHash: Cooperative Learning of Multipurpose Descriptor and Contrastive Pair Generator via Variational MCMC Teaching for Supervised Image Hashing.
CoRR, 2022

Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

One Loss for Quantization: Deep Hashing with Discrete Wasserstein Distributional Matching.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Unified Energy-Based Generative Network for Supervised Image Hashing.
Proceedings of the Computer Vision - ACCV 2022, 2022

2021
Generative models meet similarity search: efficient, heuristic-free and robust retrieval.
PhD thesis, 2021

Interpretable Graph Similarity Computation via Differentiable Optimal Alignment of Node Embeddings.
Proceedings of the SIGIR '21: The 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2021

Backdoor Attack with Imperceptible Input and Latent Modification.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

LIRA: Learnable, Imperceptible and Robust Backdoor Attacks.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

2020
Image Generation Via Minimizing Fréchet Distance in Discriminator Feature Space.
CoRR, 2020

Regression via Implicit Models and Optimal Transport Cost Minimization.
CoRR, 2020

Image Hashing by Minimizing Independent Relaxed Wasserstein Distance.
CoRR, 2020

Efficient Implicit Unsupervised Text Hashing using Adversarial Autoencoder.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

2019
An Attentive Spatio-Temporal Neural Model for Successive Point of Interest Recommendation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

Adversarial Factorization Autoencoder for Look-alike Modeling.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Targeted display advertising: the case of preferential attachment.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2016
Implications of data placement strategy to Big Data technologies based on shared-nothing architecture for geosciences.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Evaluating the impact of data placement to spark and SciDB with an Earth Science use case.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016


  Loading...