Search

Your search keyword '"Shouling Ji"' showing total 71 results

Search Constraints

Start Over You searched for: Author "Shouling Ji" Remove constraint Author: "Shouling Ji" Search Limiters Full Text Remove constraint Search Limiters: Full Text
71 results on '"Shouling Ji"'

Search Results

1. Query-efficient model extraction for text classification model in a hard label setting

2. Efficient text-based evolution algorithm to hard-label adversarial attacks on text

3. Improved functionality of Ligilactobacillus salivarius Li01 in alleviating colonic inflammation by layer-by-layer microencapsulation

4. Adversarial examples detection through the sensitivity in space mappings

5. Text-Based Price Recommendation System for Online Rental Houses

6. Spreading Social Influence with both Positive and Negative Opinions in Online Networks

7. Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services

8. One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware

9. V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs

10. Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing

11. ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks

12. Improved functionality of Ligilactobacillus salivarius Li01 in alleviating colonic inflammation by layer-by-layer microencapsulation

13. Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings

14. Text-based price recommendation system for online rental houses

15. GA-Par: Dependable Microservice Orchestration Framework for Geo-Distributed Clouds

16. EfficientTDNN: Efficient Architecture Search for Speaker Recognition

17. Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models

18. Backdoor Pre-trained Models Can Transfer to All

19. AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy

20. On the Security Risks of AutoML

21. Fine-Grained Fashion Similarity Prediction by Attribute-Specific Embedding Learning

22. Multilevel Graph Matching Networks for Deep Graph Similarity Learning

23. Smart Contract Vulnerability Detection: From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion

24. Attend to count: Crowd counting with adaptive capacity multi-scale CNNs

25. Privacy-Preserving Online Task Allocation in Edge-Computing-Enabled Massive Crowdsensing

26. An I/O Efficient Distributed Approximation Framework Using Cluster Sampling

27. Spreading social influence with both positive and negative opinions in online networks

28. Towards understanding the security of modern image captchas and underground captcha-solving services

29. Deep Dual Consecutive Network for Human Pose Estimation

30. FineFool: A Novel DNN Object Contour Attack on Image Recognition based on the Attention Perturbation Adversarial Technique

31. Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art

32. Hierarchical Similarity Learning for Language-based Product Image Retrieval

33. A Double Closed-Loop Digital Hydraulic Cylinder Position System Based on Global Fast Terminal Sliding Mode Active Disturbance Rejection Control

34. Deep Graph Matching and Searching for Semantic Code Retrieval

35. Trojaning Language Models for Fun and Profit

36. AdvMind: Inferring Adversary Intent of Black-Box Attacks

37. Privacy Risks of General-Purpose Language Models

38. De-Health: All Your Online Health Information Are Belong to Us

39. Handitext: handwriting recognition based on dynamic characteristics with incremental LSTM

40. Fine-Grained Fashion Similarity Learning by Attribute-Specific Embedding Network

41. Unsupervised Reference-Free Summary Quality Evaluation via Contrastive Learning

42. A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models

43. VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities

44. Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining

45. Efficient Global String Kernel with Random Features

46. DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model

47. SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems

48. Adversarial CAPTCHAs

49. A Truthful FPTAS Mechanism for Emergency Demand Response in Colocation Data Centers

50. Fast and parameter-light rare behavior detection in maritime trajectories

Catalog

Books, media, physical & digital resources