Privacy-preserving collaborative deep learning with unreliable participants L Zhao, Q Wang, Q Zou, Y Zhang, Y Chen IEEE Transactions on Information Forensics and Security 15, 1486-1500, 2019 | 185 | 2019 |
Inprivate digging: Enabling tree-based distributed data mining with differential privacy L Zhao, L Ni, S Hu, Y Chen, P Zhou, F Xiao, L Wu IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2087-2095, 2018 | 103 | 2018 |
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection L Zhao, S Hu, Q Wang, J Jiang, C Shen, X Luo, P Hu IEEE Transactions on Dependable and Secure Computing 18 (5), 2029-2041, 2020 | 94 | 2020 |
Veriml: Enabling integrity assurances and fair payments for machine learning as a service L Zhao, Q Wang, C Wang, Q Li, C Shen, B Feng IEEE Transactions on Parallel and Distributed Systems 32 (10), 2524-2540, 2021 | 81 | 2021 |
Sear: Secure and efficient aggregation for byzantine-robust federated learning L Zhao, J Jiang, B Feng, Q Wang, C Shen, Q Li IEEE Transactions on Dependable and Secure Computing 19 (5), 3329-3342, 2021 | 53 | 2021 |
Deep domain adaptation with differential privacy Q Wang, Z Li, Q Zou, L Zhao, S Wang IEEE Transactions on Information Forensics and Security 15, 3093-3106, 2020 | 26 | 2020 |
Advddos: Zero-query adversarial attacks against commercial speech recognition systems Y Ge, L Zhao, Q Wang, Y Duan, M Du IEEE Transactions on Information Forensics and Security, 2023 | 4 | 2023 |
Revisiting Adversarial Robustness Distillation from the Perspective of Robust Fairness X Yue, M Ningping, Q Wang, L Zhao Advances in Neural Information Processing Systems 36, 2024 | 3 | 2024 |
MiDA: Membership inference attacks against domain adaptation Y Zhang, L Zhao, Q Wang ISA transactions 141, 103-112, 2023 | 3 | 2023 |
Shielding graph for eXact analytics with SGX M Du, P Jiang, Q Wang, SSM Chow, L Zhao IEEE Transactions on Dependable and Secure Computing, 2023 | 3 | 2023 |
Practical differentially private online advertising J Sun, L Zhao, Z Liu, Q Li, X Deng, Q Wang, Y Jiang Computers & Security 112, 102504, 2022 | 3 | 2022 |
Differential privacy in deep learning: Privacy and beyond Y Wang, Q Wang, L Zhao, C Wang Future Generation Computer Systems, 2023 | 2 | 2023 |
Revisiting Adversarial Training under Long-Tailed Distributions X Yue, N Mou, Q Wang, L Zhao arXiv preprint arXiv:2403.10073, 2024 | | 2024 |
Perception-driven Imperceptible Adversarial Attack against Decision-based Black-box Models S Zhang, B Zheng, P Jiang, L Zhao, C Shen, Q Wang IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Hijacking Attacks against Neural Networks by Analyzing Training Data Y Ge, Q Wang, H Huang, Q Li, C Wang, C Shen, L Zhao, P Jiang, Z Fang, ... arXiv preprint arXiv:2401.09740, 2024 | | 2024 |
FastTextDodger: Decision-based Adversarial Attack against Black-box NLP Models with Extremely High Efficiency X Hu, G Liu, B Zheng, L Zhao, Q Wang, Y Zhang, M Du IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition JC Deng, L Dong, J Chen, D Yan, R Wang, D Ye, L Zhao, J Tian Proceedings of the 31st ACM International Conference on Multimedia, 7559-7568, 2023 | | 2023 |
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor Y Ge, P Chen, Q Wang, L Zhao, N Mou, P Jiang, C Wang, Q Li, C Shen | | |