Zobrazeno 1 - 10
of 226
pro vyhledávání: '"Hua, Zhongyun"'
Federated learning (FL) has rapidly become a compelling paradigm that enables multiple clients to jointly train a model by sharing only gradient updates for aggregation, without revealing their local private data. In order to protect the gradient upd
Externí odkaz:
http://arxiv.org/abs/2410.03407
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where adversaries can maliciously trigger model misclassifications by implanting a hidden backdoor during model training. This paper proposes a simple yet effective input-level backdoor
Externí odkaz:
http://arxiv.org/abs/2405.09786
Defense without Forgetting: Continual Adversarial Defense with Anisotropic & Isotropic Pseudo Replay
Autor:
Zhou, Yuhang, Hua, Zhongyun
Deep neural networks have demonstrated susceptibility to adversarial attacks. Adversarial defense techniques often focus on one-shot setting to maintain robustness against attack. However, new attacks can emerge in sequences in real-world deployment
Externí odkaz:
http://arxiv.org/abs/2404.01828
The proliferation of cloud computing has greatly spurred the popularity of outsourced database storage and management, in which the cloud holding outsourced databases can process database queries on demand. Among others, skyline queries play an impor
Externí odkaz:
http://arxiv.org/abs/2310.07148
Massive captured face images are stored in the database for the identification of individuals. However, these images can be observed unintentionally by data managers, which is not at the will of individuals and may cause privacy violations. Existing
Externí odkaz:
http://arxiv.org/abs/2307.00481
Vertical federated learning (VFL) has recently emerged as an appealing distributed paradigm empowering multi-party collaboration for training high-quality models over vertically partitioned datasets. Gradient boosting has been popularly adopted in VF
Externí odkaz:
http://arxiv.org/abs/2305.12652
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where a backdoored model behaves normally with clean inputs but exhibits attacker-specified behaviors upon the inputs containing triggers. Most previous backdoor attacks mainly focus on
Externí odkaz:
http://arxiv.org/abs/2211.01875
Many service computing applications require real-time dataset collection from multiple devices, necessitating efficient sampling techniques to reduce bandwidth and storage pressure. Compressive sensing (CS) has found wide-ranging applications in imag
Externí odkaz:
http://arxiv.org/abs/2209.01763
The term "metaverse", a three-dimensional virtual universe similar to the real realm, has always been full of imagination since it was put forward in the 1990s. Recently, it is possible to realize the metaverse with the continuous emergence and progr
Externí odkaz:
http://arxiv.org/abs/2203.03854
Publikováno v:
In Computers in Industry October 2024 161