Follow
Lingchen Zhao
Lingchen Zhao
Associate Professor, School of Cyber Science and Engineering, Wuhan University
Verified email at whu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Privacy-preserving collaborative deep learning with unreliable participants
L Zhao, Q Wang, Q Zou, Y Zhang, Y Chen
IEEE Transactions on Information Forensics and Security 15, 1486-1500, 2019
1852019
Inprivate digging: Enabling tree-based distributed data mining with differential privacy
L Zhao, L Ni, S Hu, Y Chen, P Zhou, F Xiao, L Wu
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2087-2095, 2018
1032018
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection
L Zhao, S Hu, Q Wang, J Jiang, C Shen, X Luo, P Hu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2029-2041, 2020
942020
Veriml: Enabling integrity assurances and fair payments for machine learning as a service
L Zhao, Q Wang, C Wang, Q Li, C Shen, B Feng
IEEE Transactions on Parallel and Distributed Systems 32 (10), 2524-2540, 2021
812021
Sear: Secure and efficient aggregation for byzantine-robust federated learning
L Zhao, J Jiang, B Feng, Q Wang, C Shen, Q Li
IEEE Transactions on Dependable and Secure Computing 19 (5), 3329-3342, 2021
532021
Deep domain adaptation with differential privacy
Q Wang, Z Li, Q Zou, L Zhao, S Wang
IEEE Transactions on Information Forensics and Security 15, 3093-3106, 2020
262020
Advddos: Zero-query adversarial attacks against commercial speech recognition systems
Y Ge, L Zhao, Q Wang, Y Duan, M Du
IEEE Transactions on Information Forensics and Security, 2023
42023
Revisiting Adversarial Robustness Distillation from the Perspective of Robust Fairness
X Yue, M Ningping, Q Wang, L Zhao
Advances in Neural Information Processing Systems 36, 2024
32024
MiDA: Membership inference attacks against domain adaptation
Y Zhang, L Zhao, Q Wang
ISA transactions 141, 103-112, 2023
32023
Shielding graph for eXact analytics with SGX
M Du, P Jiang, Q Wang, SSM Chow, L Zhao
IEEE Transactions on Dependable and Secure Computing, 2023
32023
Practical differentially private online advertising
J Sun, L Zhao, Z Liu, Q Li, X Deng, Q Wang, Y Jiang
Computers & Security 112, 102504, 2022
32022
Differential privacy in deep learning: Privacy and beyond
Y Wang, Q Wang, L Zhao, C Wang
Future Generation Computer Systems, 2023
22023
Revisiting Adversarial Training under Long-Tailed Distributions
X Yue, N Mou, Q Wang, L Zhao
arXiv preprint arXiv:2403.10073, 2024
2024
Perception-driven Imperceptible Adversarial Attack against Decision-based Black-box Models
S Zhang, B Zheng, P Jiang, L Zhao, C Shen, Q Wang
IEEE Transactions on Information Forensics and Security, 2024
2024
Hijacking Attacks against Neural Networks by Analyzing Training Data
Y Ge, Q Wang, H Huang, Q Li, C Wang, C Shen, L Zhao, P Jiang, Z Fang, ...
arXiv preprint arXiv:2401.09740, 2024
2024
FastTextDodger: Decision-based Adversarial Attack against Black-box NLP Models with Extremely High Efficiency
X Hu, G Liu, B Zheng, L Zhao, Q Wang, Y Zhang, M Du
IEEE Transactions on Information Forensics and Security, 2024
2024
Universal Defensive Underpainting Patch: Making Your Text Invisible to Optical Character Recognition
JC Deng, L Dong, J Chen, D Yan, R Wang, D Ye, L Zhao, J Tian
Proceedings of the 31st ACM International Conference on Multimedia, 7559-7568, 2023
2023
More Simplicity for Trainers, More Opportunity for Attackers: Black-Box Attacks on Speaker Recognition Systems by Inferring Feature Extractor
Y Ge, P Chen, Q Wang, L Zhao, N Mou, P Jiang, C Wang, Q Li, C Shen
The system can't perform the operation now. Try again later.
Articles 1–18