Picture for Siyue Wang

Siyue Wang

IONext: Unlocking the Next Era of Inertial Odometry

Add code
Jul 23, 2025
Viaarxiv icon

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

Add code
Mar 02, 2024
Viaarxiv icon

Detection and Recovery Against Deep Neural Network Fault Injection Attacks Based on Contrastive Learning

Add code
Jan 30, 2024
Viaarxiv icon

EMShepherd: Detecting Adversarial Samples via Side-channel Leakage

Add code
Mar 27, 2023
Figure 1 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 2 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 3 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Figure 4 for EMShepherd: Detecting Adversarial Samples via Side-channel Leakage
Viaarxiv icon

MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge

Add code
Oct 26, 2021
Figure 1 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Figure 2 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Figure 3 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Figure 4 for MEST: Accurate and Fast Memory-Economic Sparse Training Framework on the Edge
Viaarxiv icon

High-Robustness, Low-Transferability Fingerprinting of Neural Networks

Add code
May 14, 2021
Figure 1 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Figure 2 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Figure 3 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Figure 4 for High-Robustness, Low-Transferability Fingerprinting of Neural Networks
Viaarxiv icon

AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks

Add code
Feb 19, 2020
Figure 1 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 2 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 3 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Figure 4 for AdvMS: A Multi-source Multi-cost Defense Against Adversarial Attacks
Viaarxiv icon

RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition

Add code
Feb 19, 2020
Figure 1 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 2 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 3 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Figure 4 for RTMobile: Beyond Real-Time Mobile Acceleration of RNNs for Speech Recognition
Viaarxiv icon

Block Switching: A Stochastic Approach for Deep Learning Security

Add code
Feb 18, 2020
Figure 1 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 2 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 3 for Block Switching: A Stochastic Approach for Deep Learning Security
Figure 4 for Block Switching: A Stochastic Approach for Deep Learning Security
Viaarxiv icon

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

Add code
Feb 18, 2020
Figure 1 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 2 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 3 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Figure 4 for Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent
Viaarxiv icon