Search

Your search keyword '"Li, Qianmu"' showing total 490 results

Search Constraints

Start Over You searched for: Author "Li, Qianmu" Remove constraint Author: "Li, Qianmu"
490 results on '"Li, Qianmu"'

Search Results

1. Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability

2. Robust Model Aggregation for Heterogeneous Federated Learning: Analysis and Optimizations

7. Boost Adversarial Transferability by Uniform Scale and Mix Mask Method

9. Cascading Graph Convolution Contrastive Learning Networks for Multi-behavior Recommendation

10. UTPrompt: Cross-Task Backdoor Prompt Attacks Based on Universal Triggers

11. A Data Security Protection Method for Deep Neural Network Model Based on Mobility and Sharing

12. MIC: An Effective Defense Against Word-Level Textual Backdoor Attacks

15. Real-centric Consistency Learning for Deepfake Detection

16. Understanding CNNs from excitations

18. Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?

19. Boosting Adversarial Attacks with Improved Sign Method

20. Noise-Augmented Contrastive Learning for Sequential Recommendation

21. Multi-Granularity Contrastive Learning for Graph with Hierarchical Pooling

22. IMPGA: An Effective and Imperceptible Black-Box Attack Against Automatic Speech Recognition Systems

25. Adversarial Deep Ensemble: Evasion Attacks and Defenses for Malware Detection

26. Arms Race in Adversarial Malware Detection: A Survey

27. A Framework for Enhancing Deep Neural Networks Against Adversarial Malware

28. An Overview of Two Age Synthesis and Estimation Techniques

29. A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks

30. Time-Aware Gated Recurrent Unit Networks for Road Surface Friction Prediction Using Historical Data

37. Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and AICS'2019 Challenge

39. Heuristic Network Security Risk Assessment Based on Attack Graph

40. KPG4Rec: Knowledge Property-Aware Graph for Recommender Systems

41. Transformer-Based Rating-Aware Sequential Recommendation

47. HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples

Catalog

Books, media, physical & digital resources