Alert button
Picture for Lingling Fan

Lingling Fan

Alert button

An Empirical Study of Bugs in Open-Source Federated Learning Framework

Add code
Bookmark button
Alert button
Aug 09, 2023
Weijie Shao, Yuyang Gao, Fu Song, Sen Chen, Lingling Fan

Viaarxiv icon

Experimental Realization of Convolution Processing in Photonic Synthetic Frequency Dimensions

Add code
Bookmark button
Alert button
May 05, 2023
Lingling Fan, Kai Wang, Heming Wang, Avik Dutt, Shanhui Fan

Figure 1 for Experimental Realization of Convolution Processing in Photonic Synthetic Frequency Dimensions
Figure 2 for Experimental Realization of Convolution Processing in Photonic Synthetic Frequency Dimensions
Figure 3 for Experimental Realization of Convolution Processing in Photonic Synthetic Frequency Dimensions
Figure 4 for Experimental Realization of Convolution Processing in Photonic Synthetic Frequency Dimensions
Viaarxiv icon

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition

Add code
Bookmark button
Alert button
Jun 07, 2022
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang

Figure 1 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 2 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 3 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Figure 4 for Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition
Viaarxiv icon

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems

Add code
Bookmark button
Alert button
Jun 07, 2022
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

Figure 1 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 2 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 3 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Figure 4 for AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems
Viaarxiv icon

SEC4SR: A Security Analysis Platform for Speaker Recognition

Add code
Bookmark button
Alert button
Sep 04, 2021
Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

Figure 1 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 2 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 3 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Figure 4 for SEC4SR: A Security Analysis Platform for Speaker Recognition
Viaarxiv icon

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation

Add code
Bookmark button
Alert button
Apr 24, 2020
Bozhi Wu, Sen Chen, Cuiyun Gao, Lingling Fan, Yang Liu, Weiping Wen, Michael Lyu

Figure 1 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Figure 2 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Figure 3 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Figure 4 for Why an Android App is Classified as Malware? Towards Malware Classification Interpretation
Viaarxiv icon

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Add code
Bookmark button
Alert button
Apr 15, 2020
Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu

Figure 1 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Figure 2 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Figure 3 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Figure 4 for Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers
Viaarxiv icon

CORE: Automating Review Recommendation for Code Changes

Add code
Bookmark button
Alert button
Dec 20, 2019
JingKai Siow, Cuiyun Gao, Lingling Fan, Sen Chen, Yang Liu

Figure 1 for CORE: Automating Review Recommendation for Code Changes
Figure 2 for CORE: Automating Review Recommendation for Code Changes
Figure 3 for CORE: Automating Review Recommendation for Code Changes
Figure 4 for CORE: Automating Review Recommendation for Code Changes
Viaarxiv icon

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

Add code
Bookmark button
Alert button
Nov 03, 2019
Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu

Figure 1 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Figure 2 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Figure 3 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Figure 4 for Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
Viaarxiv icon