Search

Your search keyword '"Yu, Chia-Mu"' showing total 175 results

Search Constraints

Start Over You searched for: Author "Yu, Chia-Mu" Remove constraint Author: "Yu, Chia-Mu"
175 results on '"Yu, Chia-Mu"'

Search Results

1. Exploring Robustness of Visual State Space model against Backdoor Attacks

2. Defending Against Repetitive-based Backdoor Attacks on Semi-supervised Learning through Lens of Rate-Distortion-Perception Trade-off

3. Differentially Private Fine-Tuning of Diffusion Models

4. Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models

5. DiffuseKronA: A Parameter Efficient Fine-tuning Method for Personalized Diffusion Models

6. Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?

7. Exploring the Benefits of Differentially Private Pre-training and Parameter-Efficient Fine-tuning for Table Transformers

8. DPAF: Image Synthesis via Differentially Private Aggregation in Forward Phase

9. Exploring the Benefits of Visual Prompting in Differential Privacy

10. Certified Robustness of Quantum Classifiers against Adversarial Examples through Quantum Noise

11. Meta Adversarial Perturbations

12. CAFE: Catastrophic Data Leakage in Vertical Federated Learning

13. Real-World Adversarial Examples involving Makeup Application

14. Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics

15. Genetic Algorithm-Based Fair Order Assignment Optimization of Food Delivery Platform

18. Formalizing Generalization and Robustness of Neural Networks to Weight Perturbations

19. Adversarial Examples can be Effective Data Augmentation for Unsupervised Machine Learning

20. Non-Singular Adversarial Robustness of Neural Networks

21. DPCrowd: Privacy-preserving and Communication-efficient Decentralized Statistical Estimation for Real-time Crowd-sourced Data

22. Privacy in Data Service Composition

23. Detecting Deepfake-Forged Contents with Separable Convolutional Neural Network and Image Segmentation

26. Locally Differentially Private Minimum Finding

29. On The Utility of Conditional Generation Based Mutual Information for Characterizing Adversarial Subspaces

30. On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples

31. On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples

32. Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

33. Robust Estimation Method against Poisoning Attacks for Key-Value Data with Local Differential Privacy.

34. LoPub: High-Dimensional Crowdsourced Data Publication with Local Differential Privacy

35. On the Privacy Risks of Compromised Trigger-Action Platforms

37. Differentially Private Event Sequences over Infinite Streams with Relaxed Privacy Guarantee

38. Reducing Reconciliation Communication Cost with Compressed Sensing

39. Secure Multidimensional Queries in Tiered Sensor Networks

40. Constrained Function Based En-Route Filtering for Sensor Networks

46. Effective Adversarial Examples Identification of Credit Card Transactions

48. Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning

Catalog

Books, media, physical & digital resources