Picture for Kwok-Yan Lam

Kwok-Yan Lam

Proactive Detection of Physical Inter-rule Vulnerabilities in IoT Services Using a Deep Learning Approach

Add code
Jun 06, 2024
Viaarxiv icon

Object-level Copy-Move Forgery Image Detection based on Inconsistency Mining

Add code
Apr 03, 2024
Viaarxiv icon

STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario

Add code
Mar 30, 2024
Figure 1 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Figure 2 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Figure 3 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Figure 4 for STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario
Viaarxiv icon

A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles

Add code
Mar 29, 2024
Figure 1 for A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles
Figure 2 for A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles
Figure 3 for A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles
Viaarxiv icon

Threats, Attacks, and Defenses in Machine Unlearning: A Survey

Add code
Mar 26, 2024
Figure 1 for Threats, Attacks, and Defenses in Machine Unlearning: A Survey
Figure 2 for Threats, Attacks, and Defenses in Machine Unlearning: A Survey
Figure 3 for Threats, Attacks, and Defenses in Machine Unlearning: A Survey
Figure 4 for Threats, Attacks, and Defenses in Machine Unlearning: A Survey
Viaarxiv icon

Device Scheduling and Assignment in Hierarchical Federated Learning for Internet of Things

Add code
Feb 04, 2024
Viaarxiv icon

Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning

Add code
Jan 19, 2024
Viaarxiv icon

SSTA: Salient Spatially Transformed Attack

Add code
Dec 12, 2023
Figure 1 for SSTA: Salient Spatially Transformed Attack
Figure 2 for SSTA: Salient Spatially Transformed Attack
Figure 3 for SSTA: Salient Spatially Transformed Attack
Figure 4 for SSTA: Salient Spatially Transformed Attack
Viaarxiv icon

FedPEAT: Convergence of Federated Learning, Parameter-Efficient Fine Tuning, and Emulator Assisted Tuning for Artificial Intelligence Foundation Models with Mobile Edge Computing

Add code
Oct 26, 2023
Viaarxiv icon

Efficient Dataset Distillation through Alignment with Smooth and High-Quality Expert Trajectories

Add code
Oct 16, 2023
Viaarxiv icon