Alert button
Picture for Fengyuan Xu

Fengyuan Xu

Alert button

Manipulating Transfer Learning for Property Inference

Add code
Bookmark button
Alert button
Mar 21, 2023
Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans

Figure 1 for Manipulating Transfer Learning for Property Inference
Figure 2 for Manipulating Transfer Learning for Property Inference
Figure 3 for Manipulating Transfer Learning for Property Inference
Figure 4 for Manipulating Transfer Learning for Property Inference
Viaarxiv icon

Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection

Add code
Bookmark button
Alert button
Jun 18, 2021
Shucheng Li, Fengyuan Xu, Runchuan Wang, Sheng Zhong

Figure 1 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Figure 2 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Figure 3 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Figure 4 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Viaarxiv icon

Stealthy Backdoors as Compression Artifacts

Add code
Bookmark button
Alert button
Apr 30, 2021
Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans

Figure 1 for Stealthy Backdoors as Compression Artifacts
Figure 2 for Stealthy Backdoors as Compression Artifacts
Figure 3 for Stealthy Backdoors as Compression Artifacts
Figure 4 for Stealthy Backdoors as Compression Artifacts
Viaarxiv icon

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence

Add code
Bookmark button
Alert button
Jan 17, 2021
Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song

Figure 1 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Figure 2 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Figure 3 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Viaarxiv icon

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

Add code
Bookmark button
Alert button
Oct 26, 2020
Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song

Figure 1 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 2 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 3 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 4 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Viaarxiv icon

Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem

Add code
Bookmark button
Alert button
Apr 07, 2020
Shucheng Li, Lingfei Wu, Shiwei Feng, Fangli Xu, Fengyuan Xu, Sheng Zhong

Figure 1 for Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem
Figure 2 for Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem
Figure 3 for Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem
Figure 4 for Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem
Viaarxiv icon