Zobrazeno 1 - 10
of 197
pro vyhledávání: '"Fu, Anmin"'
With the growing applications of Deep Learning (DL), especially recent spectacular achievements of Large Language Models (LLMs) such as ChatGPT and LLaMA, the commercial significance of these remarkable models has soared. However, acquiring well-trai
Externí odkaz:
http://arxiv.org/abs/2411.05051
The concept of the right to be forgotten has led to growing interest in machine unlearning, but reliable validation methods are lacking, creating opportunities for dishonest model providers to mislead data contributors. Traditional invasive methods l
Externí odkaz:
http://arxiv.org/abs/2408.06063
In contrast to prevalent Federated Learning (FL) privacy inference techniques such as generative adversarial networks attacks, membership inference attacks, property inference attacks, and model inversion attacks, we devise an innovative privacy thre
Externí odkaz:
http://arxiv.org/abs/2405.15316
Personal digital data is a critical asset, and governments worldwide have enforced laws and regulations to protect data privacy. Data users have been endowed with the right to be forgotten of their data. In the course of machine learning (ML), the fo
Externí odkaz:
http://arxiv.org/abs/2403.08254
Autor:
Ma, Hua, Wang, Shang, Gao, Yansong, Zhang, Zhi, Qiu, Huming, Xue, Minhui, Abuadbba, Alsharif, Fu, Anmin, Nepal, Surya, Abbott, Derek
All current backdoor attacks on deep learning (DL) models fall under the category of a vertical class backdoor (VCB) -- class-dependent. In VCB attacks, any sample from a class activates the implanted backdoor when the secret trigger is present. Exis
Externí odkaz:
http://arxiv.org/abs/2310.00542
Autor:
Gao, Yansong, Qiu, Huming, Zhang, Zhi, Wang, Binghui, Ma, Hua, Abuadbba, Alsharif, Xue, Minhui, Fu, Anmin, Nepal, Surya
Deep Neural Network (DNN) models are often deployed in resource-sharing clouds as Machine Learning as a Service (MLaaS) to provide inference services.To steal model architectures that are of valuable intellectual properties, a class of attacks has be
Externí odkaz:
http://arxiv.org/abs/2309.11894
Autor:
WANG Zhiwei, HE Xijie, YI Xin, LI Ziyang, CAO Xudong, YIN Tao, LI Shuhao, FU Anmin, ZHANG Yuqing
Publikováno v:
Tongxin xuebao, Vol 45, Pp 206-228 (2024)
The advanced persistent threat (APT) attack was explored from two perspectives: attack methods and detection methods. First, the definitions and characteristics of APT attacks were reviewed and the development of related attack models was summarized.
Externí odkaz:
https://doaj.org/article/7a65eb32fcf5478d931ab2f6e0c44730
Publikováno v:
Tongxin xuebao, Vol 45, Pp 60-74 (2024)
The security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial
Externí odkaz:
https://doaj.org/article/71a41dd1573248248235150a5df36486
Autor:
Li, Qun, Thapa, Chandra, Ong, Lawrence, Zheng, Yifeng, Ma, Hua, Camtepe, Seyit A., Fu, Anmin, Gao, Yansong
Federated learning (FL) is the most popular distributed machine learning technique. FL allows machine-learning models to be trained without acquiring raw data to a single point for processing. Instead, local models are trained with local data; the mo
Externí odkaz:
http://arxiv.org/abs/2302.01550
Autor:
Ma, Hua, Li, Yinshan, Gao, Yansong, Zhang, Zhi, Abuadbba, Alsharif, Fu, Anmin, Al-Sarawi, Said F., Surya, Nepal, Abbott, Derek
Object detection is the foundation of various critical computer-vision tasks such as segmentation, object tracking, and event detection. To train an object detector with satisfactory accuracy, a large amount of data is required. However, due to the i
Externí odkaz:
http://arxiv.org/abs/2209.02339