Search

Your search keyword '"Gong, Xueluan"' showing total 47 results

Search Constraints

Start Over You searched for: Author "Gong, Xueluan" Remove constraint Author: "Gong, Xueluan"
47 results on '"Gong, Xueluan"'

Search Results

1. An Effective and Resilient Backdoor Attack Framework against Deep Neural Networks and Vision Transformers

2. Megatron: Evasive Clean-Label Backdoor Attacks against Vision Transformer

3. Neutralizing Backdoors through Information Conflicts for Large Language Models

4. Hidden Data Privacy Breaches in Federated Learning

5. Effective and Evasive Fuzz Testing-Driven Jailbreaking Attacks against LLMs

6. URVFL: Undetectable Data Reconstruction Attack on Vertical Federated Learning

7. Backdoor Attack with Sparse and Invisible Trigger

8. Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion

9. Adversarial Example Attacks in Internet of Things (IoT)

10. A Survey of Adversarial Attacks on Wireless Communications

11. Adversarial Examples in Wireless Networks: A Comprehensive Survey

15. Ubi-AD: Towards Ubiquitous, Passive Alzheimer Detection using the Smartwatch.

16. Leveraging Label Information for Stealthy Data Stealing in Vertical Federated Learning

18. Echo

23. Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems

24. Meta-Learning for Human-Centered Wireless Sensing: Architecture, Applications, and Challenges

30. <sc>Palette</sc>: Physically-Realizable Backdoor Attacks Against Video Recognition Models

31. <sc>KerbNet</sc>: A QoE-Aware Kernel-Based Backdoor Attack Framework

33. Wet-Ra

35. Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers

36. MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning

44. Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions

Catalog

Books, media, physical & digital resources