Search

Your search keyword '"Liu, Ximeng"' showing total 1,213 results

Search Constraints

Start Over You searched for: Author "Liu, Ximeng" Remove constraint Author: "Liu, Ximeng"
1,213 results on '"Liu, Ximeng"'

Search Results

1. MORSE: An Efficient Homomorphic Secret Sharing Scheme Enabling Non-Linear Operation

2. Detecting and Measuring Security Implications of Entangled Domain Verification in CDN

3. Unveiling the Bandwidth Nightmare: CDN Compression Format Conversion Attacks

4. SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images

5. MEAT: Median-Ensemble Adversarial Training for Improving Robustness and Generalization

6. Towards Trustworthy Unsupervised Domain Adaptation: A Representation Learning Perspective for Enhancing Robustness, Discrimination, and Generalization

7. FIGRET: Fine-Grained Robustness-Enhanced Traffic Engineering

8. MFA-Net: Multi-Scale feature fusion attention network for liver tumor segmentation

11. A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective

12. Towards Adversarial-Robust Class-Incremental Learning via Progressively Volume-Up Perturbation Generation

13. SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers

15. Federated Online/Offline Remote Data Inspection for Distributed Edge Computing

16. An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability

17. Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data

19. When Evolutionary Computation Meets Privacy

20. Efficient Routing Algorithm Design for Large DetNet

21. SRoUDA: Meta Self-training for Robust Unsupervised Domain Adaptation

22. SoK: Fully Homomorphic Encryption Accelerators

25. FedCMK: An Efficient Privacy-Preserving Federated Learning Framework

27. Q-TrHDRI: A Qurey-Based Transformer for High Dynamic Range Imaging with Dynamic Scenes

28. Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring

29. Federated Learning based on Defending Against Data Poisoning Attacks in IoT

32. MaskBlock: Transferable Adversarial Examples with Bayes Approach

33. Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons

37. Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization

44. Enhance transferability of adversarial examples with model architecture

45. Generation Matrix: An Embeddable Matrix Representation for Hierarchical Trees

46. Backdoor Defense with Machine Unlearning

50. Push Stricter to Decide Better: A Class-Conditional Feature Adaptive Framework for Improving Adversarial Robustness

Catalog

Books, media, physical & digital resources