Alert button
Picture for Sencun Zhu

Sencun Zhu

Alert button

HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning

Add code
Bookmark button
Alert button
May 10, 2023
Chongqi Guan, Heting Liu, Guohong Cao, Sencun Zhu, Thomas La Porta

Figure 1 for HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Figure 2 for HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Figure 3 for HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Figure 4 for HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Viaarxiv icon

Federated Unlearning with Knowledge Distillation

Add code
Bookmark button
Alert button
Jan 24, 2022
Chen Wu, Sencun Zhu, Prasenjit Mitra

Figure 1 for Federated Unlearning with Knowledge Distillation
Figure 2 for Federated Unlearning with Knowledge Distillation
Figure 3 for Federated Unlearning with Knowledge Distillation
Figure 4 for Federated Unlearning with Knowledge Distillation
Viaarxiv icon

AppQ: Warm-starting App Recommendation Based on View Graphs

Add code
Bookmark button
Alert button
Sep 08, 2021
Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang, Xiangliang Zhang

Figure 1 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 2 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 3 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 4 for AppQ: Warm-starting App Recommendation Based on View Graphs
Viaarxiv icon

Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder

Add code
Bookmark button
Alert button
Dec 27, 2020
Lun-Pin Yuan, Peng Liu, Sencun Zhu

Figure 1 for Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder
Figure 2 for Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder
Figure 3 for Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder
Figure 4 for Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder
Viaarxiv icon

Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users

Add code
Bookmark button
Alert button
Dec 27, 2020
Lun-Pin Yuan, Euijin Choo, Ting Yu, Issa Khalil, Sencun Zhu

Figure 1 for Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
Figure 2 for Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
Figure 3 for Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
Figure 4 for Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
Viaarxiv icon

Mitigating Backdoor Attacks in Federated Learning

Add code
Bookmark button
Alert button
Oct 28, 2020
Chen Wu, Xian Yang, Sencun Zhu, Prasenjit Mitra

Figure 1 for Mitigating Backdoor Attacks in Federated Learning
Figure 2 for Mitigating Backdoor Attacks in Federated Learning
Figure 3 for Mitigating Backdoor Attacks in Federated Learning
Figure 4 for Mitigating Backdoor Attacks in Federated Learning
Viaarxiv icon

No Peeking through My Windows: Conserving Privacy in Personal Drones

Add code
Bookmark button
Alert button
Aug 26, 2019
Alem Fitwi, Yu Chen, Sencun Zhu

Figure 1 for No Peeking through My Windows: Conserving Privacy in Personal Drones
Figure 2 for No Peeking through My Windows: Conserving Privacy in Personal Drones
Figure 3 for No Peeking through My Windows: Conserving Privacy in Personal Drones
Figure 4 for No Peeking through My Windows: Conserving Privacy in Personal Drones
Viaarxiv icon

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation

Add code
Bookmark button
Alert button
Aug 30, 2018
Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller

Figure 1 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 2 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 3 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 4 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Viaarxiv icon