Alert button
Picture for Hai Dong

Hai Dong

Alert button

FedSPU: Personalized Federated Learning for Resource-constrained Devices with Stochastic Parameter Update

Add code
Bookmark button
Alert button
Mar 18, 2024
Ziru Niu, Hai Dong, A. K. Qin

Figure 1 for FedSPU: Personalized Federated Learning for Resource-constrained Devices with Stochastic Parameter Update
Figure 2 for FedSPU: Personalized Federated Learning for Resource-constrained Devices with Stochastic Parameter Update
Figure 3 for FedSPU: Personalized Federated Learning for Resource-constrained Devices with Stochastic Parameter Update
Figure 4 for FedSPU: Personalized Federated Learning for Resource-constrained Devices with Stochastic Parameter Update
Viaarxiv icon

RITFIS: Robust input testing framework for LLMs-based intelligent software

Add code
Bookmark button
Alert button
Feb 21, 2024
Mingxuan Xiao, Yan Xiao, Hai Dong, Shunhui Ji, Pengcheng Zhang

Viaarxiv icon

FLrce: Efficient Federated Learning with Relationship-based Client Selection and Early-Stopping Strategy

Add code
Bookmark button
Alert button
Oct 15, 2023
Ziru Niu, Hai Dong, A. Kai Qin, Tao Gu

Viaarxiv icon

LEAP: Efficient and Automated Test Method for NLP Software

Add code
Bookmark button
Alert button
Aug 22, 2023
Mingxuan Xiao, Yan Xiao, Hai Dong, Shunhui Ji, Pengcheng Zhang

Figure 1 for LEAP: Efficient and Automated Test Method for NLP Software
Figure 2 for LEAP: Efficient and Automated Test Method for NLP Software
Figure 3 for LEAP: Efficient and Automated Test Method for NLP Software
Figure 4 for LEAP: Efficient and Automated Test Method for NLP Software
Viaarxiv icon

Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound

Add code
Bookmark button
Alert button
Jul 17, 2023
Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Stefanos Koffas, Yiming Li

Figure 1 for Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Figure 2 for Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Figure 3 for Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Figure 4 for Towards Stealthy Backdoor Attacks against Speech Recognition via Elements of Sound
Viaarxiv icon

VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion

Add code
Bookmark button
Alert button
Dec 20, 2022
Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji

Figure 1 for VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion
Figure 2 for VSVC: Backdoor attack against Keyword Spotting based on Voiceprint Selection and Voice Conversion
Viaarxiv icon

PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking

Add code
Bookmark button
Alert button
Nov 16, 2022
Hanbo Cai, Pengcheng Zhang, Hai Dong, Yan Xiao, Shunhui Ji

Figure 1 for PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking
Figure 2 for PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking
Figure 3 for PBSM: Backdoor attack against Keyword spotting based on pitch boosting and sound masking
Viaarxiv icon

Deep Edge Intelligence: Architecture, Key Features, Enabling Technologies and Challenges

Add code
Bookmark button
Alert button
Oct 24, 2022
Prabath Abeysekara, Hai Dong, A. K. Qin

Figure 1 for Deep Edge Intelligence: Architecture, Key Features, Enabling Technologies and Challenges
Figure 2 for Deep Edge Intelligence: Architecture, Key Features, Enabling Technologies and Challenges
Viaarxiv icon

CSSR: A Context-Aware Sequential Software Service Recommendation Model

Add code
Bookmark button
Alert button
Dec 20, 2021
Mingwei Zhang, Jiayuan Liu, Weipu Zhang, Ke Deng, Hai Dong, Ying Liu

Figure 1 for CSSR: A Context-Aware Sequential Software Service Recommendation Model
Figure 2 for CSSR: A Context-Aware Sequential Software Service Recommendation Model
Figure 3 for CSSR: A Context-Aware Sequential Software Service Recommendation Model
Figure 4 for CSSR: A Context-Aware Sequential Software Service Recommendation Model
Viaarxiv icon

Privacy-Aware Identity Cloning Detection based on Deep Forest

Add code
Bookmark button
Alert button
Oct 21, 2021
Ahmed Alharbi, Hai Dong, Xun Yi, Prabath Abeysekara

Figure 1 for Privacy-Aware Identity Cloning Detection based on Deep Forest
Figure 2 for Privacy-Aware Identity Cloning Detection based on Deep Forest
Figure 3 for Privacy-Aware Identity Cloning Detection based on Deep Forest
Figure 4 for Privacy-Aware Identity Cloning Detection based on Deep Forest
Viaarxiv icon