Alert button
Picture for Jialiang Lu

Jialiang Lu

Alert button

Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records

Add code
Bookmark button
Alert button
Jul 15, 2023
Xiao Fei, Philippe Martins, Jialiang Lu

Figure 1 for Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records
Figure 2 for Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records
Figure 3 for Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records
Figure 4 for Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records
Viaarxiv icon

An Interpretable Federated Learning-based Network Intrusion Detection Framework

Add code
Bookmark button
Alert button
Jan 10, 2022
Tian Dong, Song Li, Han Qiu, Jialiang Lu

Figure 1 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 2 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 3 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 4 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Viaarxiv icon

Fingerprinting Multi-exit Deep Neural Network Models via Inference Time

Add code
Bookmark button
Alert button
Oct 07, 2021
Tian Dong, Han Qiu, Tianwei Zhang, Jiwei Li, Hewu Li, Jialiang Lu

Figure 1 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 2 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 3 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 4 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Viaarxiv icon

TDGIA:Effective Injection Attacks on Graph Neural Networks

Add code
Bookmark button
Alert button
Jun 12, 2021
Xu Zou, Qinkai Zheng, Yuxiao Dong, Xinyu Guan, Evgeny Kharlamov, Jialiang Lu, Jie Tang

Figure 1 for TDGIA:Effective Injection Attacks on Graph Neural Networks
Figure 2 for TDGIA:Effective Injection Attacks on Graph Neural Networks
Figure 3 for TDGIA:Effective Injection Attacks on Graph Neural Networks
Figure 4 for TDGIA:Effective Injection Attacks on Graph Neural Networks
Viaarxiv icon

Hidden Backdoors in Human-Centric Language Models

Add code
Bookmark button
Alert button
May 01, 2021
Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu

Figure 1 for Hidden Backdoors in Human-Centric Language Models
Figure 2 for Hidden Backdoors in Human-Centric Language Models
Figure 3 for Hidden Backdoors in Human-Centric Language Models
Figure 4 for Hidden Backdoors in Human-Centric Language Models
Viaarxiv icon