Privacy-preserving collaborative deep learning with unreliable participants L Zhao, Q Wang, Q Zou, Y Zhang, Y Chen IEEE Transactions on Information Forensics and Security 15, 1486-1500, 2019 | 192 | 2019 |
Inprivate digging: Enabling tree-based distributed data mining with differential privacy L Zhao, L Ni, S Hu, Y Chen, P Zhou, F Xiao, L Wu IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2087-2095, 2018 | 107 | 2018 |
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection L Zhao, S Hu, Q Wang, J Jiang, C Shen, X Luo, P Hu IEEE Transactions on Dependable and Secure Computing 18 (5), 2029-2041, 2020 | 105 | 2020 |
Veriml: Enabling integrity assurances and fair payments for machine learning as a service L Zhao, Q Wang, C Wang, Q Li, C Shen, B Feng IEEE Transactions on Parallel and Distributed Systems 32 (10), 2524-2540, 2021 | 88 | 2021 |
Sear: Secure and efficient aggregation for byzantine-robust federated learning L Zhao, J Jiang, B Feng, Q Wang, C Shen, Q Li IEEE Transactions on Dependable and Secure Computing 19 (5), 3329-3342, 2021 | 60 | 2021 |
Deep domain adaptation with differential privacy Q Wang, Z Li, Q Zou, L Zhao, S Wang IEEE Transactions on Information Forensics and Security 15, 3093-3106, 2020 | 27 | 2020 |
Differential privacy in deep learning: Privacy and beyond Y Wang, Q Wang, L Zhao, C Wang Future Generation Computer Systems 148, 408-424, 2023 | 8 | 2023 |
AdvDDoS: Zero-query adversarial attacks against commercial speech recognition systems Y Ge, L Zhao, Q Wang, Y Duan, M Du IEEE Transactions on Information Forensics and Security 18, 3647-3661, 2023 | 7 | 2023 |
Revisiting adversarial robustness distillation from the perspective of robust fairness X Yue, M Ningping, Q Wang, L Zhao Advances in Neural Information Processing Systems 36, 2024 | 6 | 2024 |
MiDA: Membership inference attacks against domain adaptation Y Zhang, L Zhao, Q Wang ISA transactions 141, 103-112, 2023 | 3 | 2023 |
Shielding graph for eXact analytics with SGX M Du, P Jiang, Q Wang, SSM Chow, L Zhao IEEE Transactions on Dependable and Secure Computing 20 (6), 5102-5112, 2023 | 3 | 2023 |
Practical differentially private online advertising J Sun, L Zhao, Z Liu, Q Li, X Deng, Q Wang, Y Jiang Computers & Security 112, 102504, 2022 | 3 | 2022 |
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems Z Fang, T Wang, L Zhao, S Zhang, B Li, Y Ge, Q Li, C Shen, Q Wang arXiv preprint arXiv:2406.19311, 2024 | | 2024 |
Enhancing Adversarial Transferability Through Neighborhood Conditional Sampling C Qiu, Y Duan, L Zhao, Q Wang arXiv preprint arXiv:2405.16181, 2024 | | 2024 |
Perception-driven Imperceptible Adversarial Attack against Decision-based Black-box Models S Zhang, B Zheng, P Jiang, L Zhao, C Shen, Q Wang IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Hijacking Attacks against Neural Networks by Analyzing Training Data Y Ge, Q Wang, H Huang, Q Li, C Wang, C Shen, L Zhao, P Jiang, Z Fang, ... arXiv preprint arXiv:2401.09740, 2024 | | 2024 |
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency X Hu, G Liu, B Zheng, L Zhao, Q Wang, Y Zhang, M Du IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Revisiting Adversarial Training under Long-Tailed Distributions X Yue, N Mou, Q Wang, L Zhao Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024 | | 2024 |
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition JC Deng, L Dong, J Chen, D Yan, R Wang, D Ye, L Zhao, J Tian Proceedings of the 31st ACM International Conference on Multimedia, 7559-7568, 2023 | | 2023 |
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor Y Ge, P Chen, Q Wang, L Zhao, N Mou, P Jiang, C Wang, Q Li, C Shen | | |