Zobrazeno 1 - 10
of 543
pro vyhledávání: '"Zhao, Qingchuan"'
Autor:
Mei, Luoyu, Liu, Ruofeng, Yin, Zhimeng, Zhao, Qingchuan, Jiang, Wenchao, Wang, Shuai, Lu, Kangjie, He, Tian
Virtual reality (VR), while enhancing user experiences, introduces significant privacy risks. This paper reveals a novel vulnerability in VR systems that allows attackers to capture VR privacy through obstacles utilizing millimeter-wave (mmWave) sign
Externí odkaz:
http://arxiv.org/abs/2411.09914
Autor:
Yuan, Shuai, Li, Hongwei, Han, Xingshuo, Xu, Guowen, Jiang, Wenbo, Ni, Tao, Zhao, Qingchuan, Fang, Yuguang
Physical adversarial patches have emerged as a key adversarial attack to cause misclassification of traffic sign recognition (TSR) systems in the real world. However, existing adversarial patches have poor stealthiness and attack all vehicles indiscr
Externí odkaz:
http://arxiv.org/abs/2409.12394
Autor:
Liang, Ruichao, Chen, Jing, Wu, Cong, He, Kun, Wu, Yueming, Sun, Weisong, Du, Ruiying, Zhao, Qingchuan, Liu, Yang
Ponzi schemes, a form of scam, have been discovered in Ethereum smart contracts in recent years, causing massive financial losses. Existing detection methods primarily focus on rule-based approaches and machine learning techniques that utilize static
Externí odkaz:
http://arxiv.org/abs/2406.00921
Autor:
Sun, Xiping, Chen, Jing, He, Kun, He, Zhixiang, Du, Ruiying, Feng, Yebo, Zhao, Qingchuan, Wu, Cong
Private voice communication often contains sensitive information, making it critical to ensure that only authorized users have access to such calls. Unfortunately, current authentication mechanisms, such as PIN-based passwords, fingerprint recognitio
Externí odkaz:
http://arxiv.org/abs/2404.15000
In the rapidly evolving field of machine learning, adversarial attacks present a significant challenge to model robustness and security. Decision-based attacks, which only require feedback on the decision of a model rather than detailed probabilities
Externí odkaz:
http://arxiv.org/abs/2401.15335
Black-box query-based attacks constitute significant threats to Machine Learning as a Service (MLaaS) systems since they can generate adversarial examples without accessing the target model's architecture and parameters. Traditional defense mechanism
Externí odkaz:
http://arxiv.org/abs/2401.10586
While DeepFake applications are becoming popular in recent years, their abuses pose a serious privacy threat. Unfortunately, most related detection algorithms to mitigate the abuse issues are inherently vulnerable to adversarial attacks because they
Externí odkaz:
http://arxiv.org/abs/2312.08675
Autor:
Zhao, Qingchuan
Le carcinome séreux de haut grade (CSHG) est le sous-type histologique le plus courant du cancer de l'ovaire et demeure le cancer le plus meurtrier de l'appareil reproducteur féminin. Les récents progrès de l'immunothérapie contre le cancer ont
Externí odkaz:
http://hdl.handle.net/1866/28039
Autor:
ZHAO, QINGCHUAN
Mobile applications (apps) have exploded in popularity, with billions of smartphone users using millions of apps, and these apps either communicate with their backend cloud (e.g., Google Map) or IoT peripherals (e.g., a smart watch) or both to provid
Autor:
Zhao, Zhifeng, Fan, Qiang, Zhang, Chihao, Zheng, Lei, Lin, Jiayun, Chen, Min, Wu, Guangbo, Li, Hongjie, Huo, Haizhong, Zhao, Qingchuan, Luo, Meng
Publikováno v:
In European Journal of Pharmacology 5 October 2024 980