Alert button
Picture for Anmin Fu

Anmin Fu

Alert button

Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects

Add code
Bookmark button
Alert button
Mar 13, 2024
Na Li, Chunyi Zhou, Yansong Gao, Hui Chen, Anmin Fu, Zhi Zhang, Yu Shui

Viaarxiv icon

Vertical Federated Learning: Taxonomies, Threats, and Prospects

Add code
Bookmark button
Alert button
Feb 03, 2023
Qun Li, Chandra Thapa, Lawrence Ong, Yifeng Zheng, Hua Ma, Seyit A. Camtepe, Anmin Fu, Yansong Gao

Figure 1 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 2 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 3 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 4 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Viaarxiv icon

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Bookmark button
Alert button
Sep 06, 2022
Hua Ma, Yinshan Li, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences

Add code
Bookmark button
Alert button
May 31, 2022
Shang Wang, Yansong Gao, Anmin Fu, Zhi Zhang, Yuqing Zhang, Willy Susilo

Figure 1 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 2 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 3 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 4 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Viaarxiv icon

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures

Add code
Bookmark button
Alert button
Apr 13, 2022
Huming Qiu, Hua Ma, Zhi Zhang, Alsharif Abuadbba, Wei Kang, Anmin Fu, Yansong Gao

Figure 1 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 2 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 3 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 4 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Viaarxiv icon

Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System

Add code
Bookmark button
Alert button
Apr 05, 2022
Qianru Zhou, Rongzhen Li, Lei Xu, Arumugam Nallanathan, Jian Yanga, Anmin Fu

Figure 1 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 2 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 3 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 4 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Viaarxiv icon

PPA: Preference Profiling Attack Against Federated Learning

Add code
Bookmark button
Alert button
Feb 10, 2022
Chunyi Zhou, Yansong Gao, Anmin Fu, Kai Chen, Zhiyang Dai, Zhi Zhang, Minhui Xue, Yuqing Zhang

Figure 1 for PPA: Preference Profiling Attack Against Federated Learning
Figure 2 for PPA: Preference Profiling Attack Against Federated Learning
Figure 3 for PPA: Preference Profiling Attack Against Federated Learning
Figure 4 for PPA: Preference Profiling Attack Against Federated Learning
Viaarxiv icon

Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World

Add code
Bookmark button
Alert button
Jan 21, 2022
Hua Ma, Yinshan Li, Yansong Gao, Alsharif Abuadbba, Zhi Zhang, Anmin Fu, Hyoungshick Kim, Said F. Al-Sarawi, Nepal Surya, Derek Abbott

Figure 1 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 2 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 3 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Figure 4 for Dangerous Cloaking: Natural Trigger based Backdoor Attacks on Object Detectors in the Physical World
Viaarxiv icon

NTD: Non-Transferability Enabled Backdoor Detection

Add code
Bookmark button
Alert button
Nov 22, 2021
Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott

Figure 1 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 2 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 3 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 4 for NTD: Non-Transferability Enabled Backdoor Detection
Viaarxiv icon

Quantization Backdoors to Deep Learning Models

Add code
Bookmark button
Alert button
Aug 20, 2021
Hua Ma, Huming Qiu, Yansong Gao, Zhi Zhang, Alsharif Abuadbba, Anmin Fu, Said Al-Sarawi, Derek Abbott

Figure 1 for Quantization Backdoors to Deep Learning Models
Figure 2 for Quantization Backdoors to Deep Learning Models
Figure 3 for Quantization Backdoors to Deep Learning Models
Figure 4 for Quantization Backdoors to Deep Learning Models
Viaarxiv icon