Alert button
Picture for Gaolei Li

Gaolei Li

Alert button

Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices

Add code
Bookmark button
Alert button
Mar 27, 2024
Hanqing Fu, Gaolei Li, Jun Wu, Jianhua Li, Xi Lin, Kai Zhou, Yuchen Liu

Viaarxiv icon

What Makes Good Collaborative Views? Contrastive Mutual Information Maximization for Multi-Agent Perception

Add code
Bookmark button
Alert button
Mar 15, 2024
Wanfang Su, Lixing Chen, Yang Bai, Xi Lin, Gaolei Li, Zhe Qu, Pan Zhou

Figure 1 for What Makes Good Collaborative Views? Contrastive Mutual Information Maximization for Multi-Agent Perception
Figure 2 for What Makes Good Collaborative Views? Contrastive Mutual Information Maximization for Multi-Agent Perception
Figure 3 for What Makes Good Collaborative Views? Contrastive Mutual Information Maximization for Multi-Agent Perception
Figure 4 for What Makes Good Collaborative Views? Contrastive Mutual Information Maximization for Multi-Agent Perception
Viaarxiv icon

On-demand Quantization for Green Federated Generative Diffusion in Mobile Edge Networks

Add code
Bookmark button
Alert button
Mar 07, 2024
Bingkun Lai, Jiayi He, Jiawen Kang, Gaolei Li, Minrui Xu, Tao zhang, Shengli Xie

Figure 1 for On-demand Quantization for Green Federated Generative Diffusion in Mobile Edge Networks
Figure 2 for On-demand Quantization for Green Federated Generative Diffusion in Mobile Edge Networks
Figure 3 for On-demand Quantization for Green Federated Generative Diffusion in Mobile Edge Networks
Figure 4 for On-demand Quantization for Green Federated Generative Diffusion in Mobile Edge Networks
Viaarxiv icon

Slicer Networks

Add code
Bookmark button
Alert button
Jan 18, 2024
Hang Zhang, Xiang Chen, Rongguang Wang, Renjiu Hu, Dongdong Liu, Gaolei Li

Viaarxiv icon

Toward the Tradeoffs between Privacy, Fairness and Utility in Federated Learning

Add code
Bookmark button
Alert button
Nov 30, 2023
Kangkang Sun, Xiaojin Zhang, Xi Lin, Gaolei Li, Jing Wang, Jianhua Li

Viaarxiv icon

Spatially Covariant Image Registration with Text Prompts

Add code
Bookmark button
Alert button
Nov 27, 2023
Hang Zhang, Xiang Chen, Rongguang Wang, Renjiu Hu, Dongdong Liu, Gaolei Li

Figure 1 for Spatially Covariant Image Registration with Text Prompts
Figure 2 for Spatially Covariant Image Registration with Text Prompts
Figure 3 for Spatially Covariant Image Registration with Text Prompts
Figure 4 for Spatially Covariant Image Registration with Text Prompts
Viaarxiv icon

Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach

Add code
Bookmark button
Alert button
Aug 02, 2023
Xing Ai, Jialong Zhou, Yulin Zhu, Gaolei Li, Tomasz P. Michalak, Xiapu Luo, Kai Zhou

Figure 1 for Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Figure 2 for Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Figure 3 for Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Figure 4 for Graph Anomaly Detection at Group Level: A Topology Pattern Enhanced Unsupervised Approach
Viaarxiv icon

Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats

Add code
Bookmark button
Alert button
Jun 14, 2023
Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu

Figure 1 for Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats
Figure 2 for Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats
Figure 3 for Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats
Figure 4 for Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats
Viaarxiv icon

Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios

Add code
Bookmark button
Alert button
Jun 13, 2023
Haochen Mei, Gaolei Li, Jun Wu, Longfei Zheng

Figure 1 for Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios
Figure 2 for Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios
Figure 3 for Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios
Figure 4 for Privacy Inference-Empowered Stealthy Backdoor Attack on Federated Learning under Non-IID Scenarios
Viaarxiv icon