Zhu, Hao‐Jin
172  Ergebnisse:
Personensuche X
?
1

Literature Review of Backdoor Attacks:

, In: Wireless Networks; Backdoor Attacks against Learning-Based Algorithms,
Li, Shaofeng ; Zhu, Haojin ; Wu, Wen. - p. 23-41 , 2024
 
?
2

Privacy-preserving Liveness Detection for Securing Smart Vo..:

Meng, Yan ; Li, Jiachun ; Zhu, Haojin..
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
4

Backdoor Attacks and Defense in FL:

, In: Wireless Networks; Backdoor Attacks against Learning-Based Algorithms,
Li, Shaofeng ; Zhu, Haojin ; Wu, Wen. - p. 123-147 , 2024
 
?
7

Hidden Backdoor Attacks in NLP Based Network Services:

, In: Wireless Networks; Backdoor Attacks against Learning-Based Algorithms,
Li, Shaofeng ; Zhu, Haojin ; Wu, Wen. - p. 79-122 , 2024
 
?
9

Introduction:

, In: Wireless Networks; Backdoor Attacks against Learning-Based Algorithms,
Li, Shaofeng ; Zhu, Haojin ; Wu, Wen. - p. 1-21 , 2024
 
?
10

Invisible Backdoor Attacks in Image Classification Based Ne..:

, In: Wireless Networks; Backdoor Attacks against Learning-Based Algorithms,
Li, Shaofeng ; Zhu, Haojin ; Wu, Wen. - p. 43-78 , 2024
 
?
14

EM-Whisperer: A Voice Injection Attack via Powerline for Vi..:

, In: 2023 IEEE/CIC International Conference on Communications in China (ICCC),
Li, Jiachun ; Meng, Yan ; Zhang, Le.. - p. 1-6 , 2023
 
?
15

Vetting Privacy Policies in VR: A Data Minimization Princip..:

, In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS),
Zhan, Yuxia ; Meng, Yan ; Zhou, Lu. - p. 1-2 , 2023
 
1-15