Search

Your search keyword '"Weng, Jian"' showing total 2,729 results

Search Constraints

Start Over You searched for: Author "Weng, Jian" Remove constraint Author: "Weng, Jian"
2,729 results on '"Weng, Jian"'

Search Results

1. Unveiling the Achilles' Heel: Backdoor Watermarking Forgery Attack in Public Dataset Protection

2. Twin Trigger Generative Networks for Backdoor Attacks against Object Detection

3. Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification

4. Towards Robust Knowledge Tracing Models via k-Sparse Attention

5. Enabling Privacy-Preserving and Publicly Auditable Federated Learning

8. OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network

9. Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales

12. Generic Differential Key Recovery Attacks and Beyond

15. PIMSAB: A Processing-In-Memory System with Spatially-Aware Communication and Bit-Serial-Aware Computation

17. Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems

18. Security and Privacy on Generative Data in AIGC: A Survey

19. Decentralized Finance (DeFi): A Survey

21. A Survey of Secure Computation Using Trusted Execution Environments

22. Enhancing Deep Knowledge Tracing with Auxiliary Tasks

23. Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices

25. Proof of Unlearning: Definitions and Instantiation

26. Etiological analysis of influenza-like cases in Taizhou City, Zhejiang Province from 2013 to 2022

27. Learning Second Order Local Anomaly for General Face Forgery Detection

30. Kleptography

31. Towards Target Sequential Rules

32. Deniable Steganography

33. Fusion: Efficient and Secure Inference Resilient to Malicious Servers

40. A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network

41. A Robust Document Image Watermarking Scheme using Deep Neural Network

42. pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing

46. US-Rule: Discovering Utility-driven Sequential Rules

47. Utility-driven Mining of Contiguous Sequences

Catalog

Books, media, physical & digital resources