333 results on '"Zhang, Quanxin"'
Search Results
2. EasyLog: An Efficient Kernel Logging Service for Machine Learning
3. Adversarial Attacks Against Object Detection in Remote Sensing Images
4. A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse
5. Enhancing Clean Label Backdoor Attack with Two-phase Specific Triggers
6. A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse
7. Adversarial Attacks Against Object Detection in Remote Sensing Images
8. Boosting Adversarial Transferability of MLP-Mixer
9. Adsorption of neonicotinoid insecticides by mulch film-derived microplastics and their combined toxicity
10. Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity
11. ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks
12. Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering
13. A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service
14. Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture
15. Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles
16. A Random Multi-target Backdooring Attack on Deep Neural Networks
17. Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning
18. On-line Firmware Updating and Fingerprint Generating for Solid State Disks
19. Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System
20. Towards a physical-world adversarial patch for blinding object detection models
21. A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis
22. An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers
23. A discrete cosine transform-based query efficient attack on black-box object detectors
24. A Hybrid Covert Channel with Feedback over Mobile Networks
25. Speaker Recognition Based on Lightweight Neural Network for Smart Home Solutions
26. Design of Anonymous Communication Protocol Based on Group Signature
27. Boosting Training for PDF Malware Classifier via Active Learning
28. Evading PDF Malware Classifiers with Generative Adversarial Network
29. An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home Assistant
30. Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain
31. A Quantified Accuracy Measurement Based Localization Algorithm for Autonomous Underwater Vehicles
32. An Universal Perturbation Generator for Black-Box Attacks Against Object Detectors
33. Towards cross-task universal perturbation against black-box object detectors in autonomous driving
34. Adaptive iterative attack towards explainable adversarial robustness
35. Effects of Different Altitudes on Castanopsis hystrix, the Top Community-Building Species in Southern Subtropical China: Rhizospheric Soil Chemical Properties and Soil Microbiota
36. Crafting Transferable Adversarial Examples Against Face Recognition via Gradient Eroding
37. A VoLTE Encryption Experiment for Android Smartphones
38. Security Extension and Robust Upgrade of Smart-Watch Wi-Fi Controller Firmware
39. Permission Dispatching Mechanism Inside and Outside of the Warranty Period for Equipment Maintenance Service System
40. A Random Multi-target Backdooring Attack on Deep Neural Networks
41. On-line Firmware Updating and Fingerprint Generating for Solid State Disks
42. Intelligent Attack Behavior Portrait for Path Planning of Unmanned Vehicles
43. Anti Intelligent Mine Unmanned Ground Vehicle Based on Reinforcement Learning
44. Establishing a software defect prediction model via effective dimension reduction
45. Delving Deep into Reverse Engineering of UEFI Firmwares via Human Interface Infrastructure
46. Research of Optimizing the System Partition in Android System
47. Building packet length covert channel over mobile VoIP traffics
48. Building covert timing channels by packet rearrangement over mobile networks
49. RootAgency: A digital signature-based root privilege management agency for cloud terminal devices
50. A root privilege management scheme with revocable authorization for Android devices
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.