Search

Your search keyword '"Lam, Kwok-Yan"' showing total 780 results

Search Constraints

Start Over You searched for: Author "Lam, Kwok-Yan" Remove constraint Author: "Lam, Kwok-Yan"
780 results on '"Lam, Kwok-Yan"'

Search Results

1. Trustworthy, Responsible, and Safe AI: A Comprehensive Architectural Framework for AI Safety with Challenges and Mitigations

2. Towards Physical World Backdoor Attacks against Skeleton Action Recognition

3. Unlearnable Examples Detection via Iterative Filtering

4. Proactive Detection of Physical Inter-rule Vulnerabilities in IoT Services Using a Deep Learning Approach

5. Guaranteeing Data Privacy in Federated Unlearning with Dynamic User Participation

6. Privacy-Preserving Federated Unlearning with Certified Client Removal

7. Privacy-Aware Spectrum Pricing and Power Control Optimization for LEO Satellite Internet-of-Things

8. Object-level Copy-Move Forgery Image Detection based on Inconsistency Mining

9. STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario

10. Decentralized Multimedia Data Sharing in IoV: A Learning-based Equilibrium of Supply and Demand

11. A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles

12. Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks

13. Threats, Attacks, and Defenses in Machine Unlearning: A Survey

14. Device Scheduling and Assignment in Hierarchical Federated Learning for Internet of Things

15. Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning

16. Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning

20. SSTA: Salient Spatially Transformed Attack

21. A Survey on Federated Unlearning: Challenges, Methods, and Future Directions

22. FedPEAT: Convergence of Federated Learning, Parameter-Efficient Fine Tuning, and Emulator Assisted Tuning for Artificial Intelligence Foundation Models with Mobile Edge Computing

23. Efficient Dataset Distillation through Alignment with Smooth and High-Quality Expert Trajectories

24. SCME: A Self-Contrastive Method for Data-free and Query-Limited Model Extraction Attack

25. Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models

26. A Survey on Conflict Detection in IoT-based Smart Homes

27. User Assignment and Resource Allocation for Hierarchical Federated Learning over Wireless Networks

28. UAV-assisted Semantic Communication with Hybrid Action Reinforcement Learning

29. Separate-and-Aggregate: A Transformer-based Patch Refinement Model for Knowledge Graph Completion

30. Dipping PLMs Sauce: Bridging Structure and Text for Effective Knowledge Graph Completion via Conditional Soft Prompting

31. Spear or Shield: Leveraging Generative AI to Tackle Security Threats of Intelligent Network Services

32. A Hybrid Framework of Reinforcement Learning and Convex Optimization for UAV-Based Autonomous Metaverse Data Collection

33. Honey-Gauge: Enabling User-Centric Honeypot Classification

34. SCME: A Self-contrastive Method for Data-Free and Query-Limited Model Extraction Attack

35. UAV aided Metaverse over Wireless Communications: A Reinforcement Learning Approach

36. Enhancing Federated Learning with spectrum allocation optimization and device selection

37. Traceable and Authenticable Image Tagging for Fake News Detection

38. Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and Supervised Learning

39. Facial Landmark Predictions with Applications to Metaverse

40. Resource Allocation and Resolution Control in the Metaverse with Mobile Augmented Reality

41. Knowledge Is Flat: A Seq2Seq Generative Framework for Various Knowledge Graph Completion

42. One-Class Knowledge Distillation for Face Presentation Attack Detection

44. Efficient Dropout-resilient Aggregation for Privacy-preserving Machine Learning

45. Privacy-Preserving Aggregation in Federated Learning: A Survey

46. Secure Multi-Party Delegated Authorisation For Access and Sharing of Electronic Health Records

47. Analysis of Digital Sovereignty and Identity: From Digitization to Digitalization

48. Understanding Security in Smart City Domains From the ANT-centric Perspective

50. Asymmetric Modality Translation For Face Presentation Attack Detection

Catalog

Books, media, physical & digital resources