Picture for Tian Dong

Tian Dong

Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing

Add code
Dec 22, 2022
Figure 1 for Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing
Figure 2 for Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing
Figure 3 for Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing
Figure 4 for Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing
Viaarxiv icon

Privacy for Free: How does Dataset Condensation Help Privacy?

Add code
Jun 01, 2022
Figure 1 for Privacy for Free: How does Dataset Condensation Help Privacy?
Figure 2 for Privacy for Free: How does Dataset Condensation Help Privacy?
Figure 3 for Privacy for Free: How does Dataset Condensation Help Privacy?
Figure 4 for Privacy for Free: How does Dataset Condensation Help Privacy?
Viaarxiv icon

An Interpretable Federated Learning-based Network Intrusion Detection Framework

Add code
Jan 10, 2022
Figure 1 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 2 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 3 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 4 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Viaarxiv icon

Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks

Add code
Nov 19, 2021
Figure 1 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Figure 2 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Figure 3 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Figure 4 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Viaarxiv icon

Fingerprinting Multi-exit Deep Neural Network Models via Inference Time

Add code
Oct 07, 2021
Figure 1 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 2 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 3 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 4 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Viaarxiv icon

Hidden Backdoors in Human-Centric Language Models

Add code
May 01, 2021
Figure 1 for Hidden Backdoors in Human-Centric Language Models
Figure 2 for Hidden Backdoors in Human-Centric Language Models
Figure 3 for Hidden Backdoors in Human-Centric Language Models
Figure 4 for Hidden Backdoors in Human-Centric Language Models
Viaarxiv icon

Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets

Add code
May 23, 2019
Figure 1 for Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets
Figure 2 for Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets
Figure 3 for Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets
Figure 4 for Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets
Viaarxiv icon