Search

Your search keyword '"Chang EE"' showing total 473 results

Search Constraints

Start Over You searched for: Author "Chang EE" Remove constraint Author: "Chang EE"
473 results on '"Chang EE"'

Search Results

1. Revisiting Backdoor Attacks against Large Vision-Language Models

2. AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models

3. Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training

4. Object Detectors in the Open Environment: Challenges, Solutions, and Outlook

5. Unlearning Backdoor Threats: Enhancing Backdoor Defense in Multimodal Contrastive Learning via Local Token Unlearning

6. On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers

7. VL-Trojan: Multimodal Instruction Backdoor Attacks against Autoregressive Visual Language Models

8. Semantic Mirror Jailbreak: Genetic Algorithm Based Jailbreak Prompts Against Open-source LLMs

9. Domain Bridge: Generative model-based domain forensic for black-box models

10. BadCLIP: Dual-Embedding Guided Backdoor Attack on Multimodal Contrastive Learning

11. Improving Adversarial Transferability by Stable Diffusion

12. Mostree : Malicious Secure Private Decision Tree Evaluation with Sublinear Communication

13. Using Large Language Models for Cybersecurity Capture-The-Flag Challenges and Certification Questions

14. Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

15. Finding Meaningful Distributions of ML Black-boxes under Forensic Investigation

16. Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence

17. Purifier: Defending Data Inference Attacks via Transforming Confidence Scores

18. Projecting Non-Fungible Token (NFT) Collections: A Contextual Generative Approach

19. Mixed Fault Tolerance Protocols with Trusted Execution Environment

20. De-END: Decoder-driven Watermarking Network

21. Scalable Private Decision Tree Evaluation with Sublinear Communication

22. Mitigating Adversarial Attacks by Distributing Different Copies to Different Users

23. Poisoning Online Learning Filters: DDoS Attacks and Countermeasures

25. Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning

27. SHADOWCAST: Controllable Graph Generation

28. Defending Model Inversion and Membership Inference Attacks via Prediction Purification

29. Benefits and Pitfalls of Using Capture the Flag Games in University Courses

30. Confusing and Detecting ML Adversarial Attacks with Injected Attractors

31. Self-Expiring Data Capsule using Trusted Execution Environment

32. Effectiveness of Distillation Attack and Countermeasure on Neural Network Watermarking

33. Enhancing Transformation-based Defenses using a Distribution Classifier

34. Autonomous Membership Service for Enclave Applications

35. Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment

36. Fair Marketplace for Secure Outsourced Computations

37. Towards Scaling Blockchain Systems via Sharding

38. Flipped-Adversarial AutoEncoders

40. Evading Classifiers by Morphing in the Dark

41. Common Component in Black-Boxes Is Prone to Attacks

42. Working together with people with intellectual disability to make a difference: a protocol for a mixed-method co-production study to address inequities in cervical screening participation

43. Evaluation of the Cultural, Social and Emotional Wellbeing Program with Aboriginal women in the Boronia Pre‐Release Centre for Women: a mixed methods study.

44. Towards a Marketplace for Secure Outsourced Computations

45. Designing a Mobile-Based Solution for Self-management of Chronic Pain

46. Publishing Location Dataset Differential Privately with Isotonic Regression

47. Securing Interactive Sessions Using Mobile Device through Visual Channel and Visual Inspection

49. A New Functional Encryption for Multidimensional Range Query (Short Paper)

50. Watermarking with Fixed Decoder for Aesthetic 2D Barcode

Catalog

Books, media, physical & digital resources