Alert button
Picture for Dayong Ye

Dayong Ye

Alert button

Minhui

Reinforcement Unlearning

Dec 26, 2023
Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Jason, Xue, Sheng Shen, Wanlei Zhou

Viaarxiv icon

Boosting Model Inversion Attacks with Adversarial Examples

Jun 24, 2023
Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou

Figure 1 for Boosting Model Inversion Attacks with Adversarial Examples
Figure 2 for Boosting Model Inversion Attacks with Adversarial Examples
Figure 3 for Boosting Model Inversion Attacks with Adversarial Examples
Figure 4 for Boosting Model Inversion Attacks with Adversarial Examples
Viaarxiv icon

New Challenges in Reinforcement Learning: A Survey of Security and Privacy

Dec 31, 2022
Yunjiao Lei, Dayong Ye, Sheng Shen, Yulei Sui, Tianqing Zhu, Wanlei Zhou

Viaarxiv icon

One Parameter Defense -- Defending against Data Inference Attacks via Differential Privacy

Mar 13, 2022
Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou

Viaarxiv icon

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It

Mar 13, 2022
Dayong Ye, Huiqiang Chen, Shuai Zhou, Tianqing Zhu, Wanlei Zhou, Shouling Ji

Figure 1 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 2 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 3 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Figure 4 for Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
Viaarxiv icon

Label-only Model Inversion Attack: The Attack that Requires the Least Information

Mar 13, 2022
Dayong Ye, Tianqing Zhu, Shuai Zhou, Bo Liu, Wanlei Zhou

Figure 1 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 2 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 3 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Figure 4 for Label-only Model Inversion Attack: The Attack that Requires the Least Information
Viaarxiv icon

DP-Image: Differential Privacy for Image Data in Feature Space

Mar 12, 2021
Bo Liu, Ming Ding, Hanyu Xue, Tianqing Zhu, Dayong Ye, Li Song, Wanlei Zhou

Figure 1 for DP-Image: Differential Privacy for Image Data in Feature Space
Figure 2 for DP-Image: Differential Privacy for Image Data in Feature Space
Figure 3 for DP-Image: Differential Privacy for Image Data in Feature Space
Figure 4 for DP-Image: Differential Privacy for Image Data in Feature Space
Viaarxiv icon

Differentially Private Multi-Agent Planning for Logistic-like Problems

Aug 16, 2020
Dayong Ye, Tianqing Zhu, Sheng Shen, Wanlei Zhou, Philip S. Yu

Figure 1 for Differentially Private Multi-Agent Planning for Logistic-like Problems
Figure 2 for Differentially Private Multi-Agent Planning for Logistic-like Problems
Figure 3 for Differentially Private Multi-Agent Planning for Logistic-like Problems
Figure 4 for Differentially Private Multi-Agent Planning for Logistic-like Problems
Viaarxiv icon

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence

Aug 05, 2020
Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip S. Yu

Figure 1 for More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence
Figure 2 for More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence
Figure 3 for More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence
Figure 4 for More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence
Viaarxiv icon