Alert button
Picture for Kaitai Liang

Kaitai Liang

Alert button

Low-Frequency Black-Box Backdoor Attack via Evolutionary Algorithm

Add code
Bookmark button
Alert button
Mar 06, 2024
Yanqi Qiao, Dazhuang Liu, Rui Wang, Kaitai Liang

Viaarxiv icon

FTA: Stealthy and Robust Backdoor Attack with Flexible Trigger on Federated Learning

Add code
Bookmark button
Alert button
Aug 31, 2023
Yanqi Qiao, Congwen Chen, Rui Wang, Kaitai Liang

Figure 1 for FTA: Stealthy and Robust Backdoor Attack with Flexible Trigger on Federated Learning
Figure 2 for FTA: Stealthy and Robust Backdoor Attack with Flexible Trigger on Federated Learning
Figure 3 for FTA: Stealthy and Robust Backdoor Attack with Flexible Trigger on Federated Learning
Figure 4 for FTA: Stealthy and Robust Backdoor Attack with Flexible Trigger on Federated Learning
Viaarxiv icon

BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering

Add code
Bookmark button
Alert button
Aug 22, 2022
Rui Wang, Xingkai Wang, Huanhuan Chen, Stjepan Picek, Zhen Liu, Kaitai Liang

Figure 1 for BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering
Figure 2 for BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering
Figure 3 for BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering
Figure 4 for BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering
Viaarxiv icon

Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks

Add code
Bookmark button
Alert button
Jul 01, 2022
Ignjat Pejic, Rui Wang, Kaitai Liang

Figure 1 for Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks
Figure 2 for Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks
Figure 3 for Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks
Figure 4 for Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks
Viaarxiv icon

Using Autoencoders on Differentially Private Federated Learning GANs

Add code
Bookmark button
Alert button
Jun 24, 2022
Gregor Schram, Rui Wang, Kaitai Liang

Figure 1 for Using Autoencoders on Differentially Private Federated Learning GANs
Figure 2 for Using Autoencoders on Differentially Private Federated Learning GANs
Figure 3 for Using Autoencoders on Differentially Private Federated Learning GANs
Figure 4 for Using Autoencoders on Differentially Private Federated Learning GANs
Viaarxiv icon

MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-IID distribution

Add code
Bookmark button
Alert button
Jun 24, 2022
Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Figure 1 for MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-IID distribution
Figure 2 for MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-IID distribution
Figure 3 for MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-IID distribution
Figure 4 for MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-IID distribution
Viaarxiv icon

FLVoogd: Robust And Privacy Preserving Federated Learning

Add code
Bookmark button
Alert button
Jun 24, 2022
Yuhang Tian, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Figure 1 for FLVoogd: Robust And Privacy Preserving Federated Learning
Figure 2 for FLVoogd: Robust And Privacy Preserving Federated Learning
Figure 3 for FLVoogd: Robust And Privacy Preserving Federated Learning
Figure 4 for FLVoogd: Robust And Privacy Preserving Federated Learning
Viaarxiv icon

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks

Add code
Bookmark button
Alert button
Feb 07, 2022
Jing Xu, Rui Wang, Kaitai Liang, Stjepan Picek

Figure 1 for More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks
Figure 2 for More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks
Figure 3 for More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks
Figure 4 for More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks
Viaarxiv icon

HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles

Add code
Bookmark button
Alert button
Nov 03, 2021
Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang, George Loukas, Emmanouil Panaousis

Figure 1 for HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
Figure 2 for HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
Figure 3 for HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
Figure 4 for HoneyCar: A Framework to Configure HoneypotVulnerabilities on the Internet of Vehicles
Viaarxiv icon