Qin, Zhan
3685  results:
Search for persons X
?
1

Task-Free Fairness-Aware Bias Mitigation for Black-Box Depl..:

Cao, Guodong ; Wang, Zhibo ; Feng, Yunhe...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 3390-3405 , 2024
 
?
2

Effectively Improving Data Diversity of Substitute Training..:

Wei, Yang ; Ma, Zhuo ; Ma, Zhuoran...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 4206-4219 , 2024
 
?
3

PoisonPrompt: Backdoor Attack on Prompt-Based Large Languag..:

, In: ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP),
Yao, Hongwei ; Lou, Jian ; Qin, Zhan - p. 7745-7749 , 2024
 
?
4

SCRR: Stable Malware Detection under Unknown Deployment Env..:

Yang, Yuchen ; Yuan, Bo ; Lou, Jian.
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
5

PrivacyAsst: Safeguarding User Privacy in Tool-Using Large ..:

Zhang, Xinyu ; Xu, Huiyu ; Ba, Zhongjie...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
6

Label-Free Poisoning Attack Against Deep Unsupervised Domai..:

Wang, Zhibo ; Liu, Wenxin ; Hu, Jiahui...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 1572-1586 , 2024
 
?
7

RemovalNet: DNN Fingerprint Removal Attacks:

Yao, Hongwei ; Li, Zheng ; Huang, Kunzhe...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 2645-2658 , 2024
 
?
8

Privacy Enhancement Via Dummy Points in the Shuffle Model:

Li, Xiaochen ; Liu, Weiran ; Feng, Hanwen...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  3 - p. 1001-1016 , 2024
 
?
9

FedTracker: Furnishing Ownership Verification and Traceabil..:

Shao, Shuo ; Yang, Wenyuan ; Gu, Hanlin...
IEEE Transactions on Dependable and Secure Computing.  , 2024
 
?
10

ShapleyFL: Robust Federated Learning Based on Shapley Value:

, In: Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining,
Sun, Qiheng ; Li, Xiang ; Zhang, Jiayao... - p. 2096-2108 , 2023
 
?
11

MUter: Machine Unlearning on Adversarially Trained Models:

, In: 2023 IEEE/CVF International Conference on Computer Vision (ICCV),
Liu, Junxu ; Xue, Mingsheng ; Lou, Jian... - p. 4869-4879 , 2023
 
?
12

MsDroid: Identifying Malicious Snippets for Android Malware..:

He, Yiling ; Liu, Yiping ; Wu, Lei...
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  3 - p. 2025-2039 , 2023
 
?
13

Equitable Data Valuation Meets the Right to Be Forgotten in..:

Xia, Haocheng ; Liu, Jinfei ; Lou, Jian...
Proceedings of the VLDB Endowment.  16 (2023)  11 - p. 3349-3362 , 2023
 
?
14

DeUEDroid: Detecting Underground Economy Apps Based on UTG ..:

, In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis,
Chen, Zhuo ; Liu, Jie ; Hu, Yubo... - p. 223-235 , 2023
 
?
15

Quantifying and Defending against Privacy Threats on Federa..:

, In: Proceedings of the ACM Web Conference 2023,
Hu, Yuke ; Liang, Wei ; Wu, Ruofan... - p. 2306-2317 , 2023
 
1-15