Alert button
Picture for Tian Dong

Tian Dong

Alert button

Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing

Add code
Bookmark button
Alert button
Dec 22, 2022
Tian Dong, Ziyuan Zhang, Han Qiu, Tianwei Zhang, Hewu Li, Terry Wang

Figure 1 for Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing
Figure 2 for Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing
Figure 3 for Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing
Figure 4 for Mind Your Heart: Stealthy Backdoor Attack on Dynamic Deep Neural Network in Edge Computing
Viaarxiv icon

Privacy for Free: How does Dataset Condensation Help Privacy?

Add code
Bookmark button
Alert button
Jun 01, 2022
Tian Dong, Bo Zhao, Lingjuan Lyu

Figure 1 for Privacy for Free: How does Dataset Condensation Help Privacy?
Figure 2 for Privacy for Free: How does Dataset Condensation Help Privacy?
Figure 3 for Privacy for Free: How does Dataset Condensation Help Privacy?
Figure 4 for Privacy for Free: How does Dataset Condensation Help Privacy?
Viaarxiv icon

An Interpretable Federated Learning-based Network Intrusion Detection Framework

Add code
Bookmark button
Alert button
Jan 10, 2022
Tian Dong, Song Li, Han Qiu, Jialiang Lu

Figure 1 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 2 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 3 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 4 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Viaarxiv icon

Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks

Add code
Bookmark button
Alert button
Nov 19, 2021
Wei Wang, Ruoxi Sun, Tian Dong, Shaofeng Li, Minhui Xue, Gareth Tyson, Haojin Zhu

Figure 1 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Figure 2 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Figure 3 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Figure 4 for Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks
Viaarxiv icon

Fingerprinting Multi-exit Deep Neural Network Models via Inference Time

Add code
Bookmark button
Alert button
Oct 07, 2021
Tian Dong, Han Qiu, Tianwei Zhang, Jiwei Li, Hewu Li, Jialiang Lu

Figure 1 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 2 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 3 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 4 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Viaarxiv icon

Hidden Backdoors in Human-Centric Language Models

Add code
Bookmark button
Alert button
May 01, 2021
Shaofeng Li, Hui Liu, Tian Dong, Benjamin Zi Hao Zhao, Minhui Xue, Haojin Zhu, Jialiang Lu

Figure 1 for Hidden Backdoors in Human-Centric Language Models
Figure 2 for Hidden Backdoors in Human-Centric Language Models
Figure 3 for Hidden Backdoors in Human-Centric Language Models
Figure 4 for Hidden Backdoors in Human-Centric Language Models
Viaarxiv icon

Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets

Add code
Bookmark button
Alert button
May 23, 2019
Hongyu Chen, Xiting Zhao, Jianwen Luo, Zhijie Yang, Zehao Zhao, Haochuan Wan, Xiaoya Ye, Guangyuan Weng, Zhenpeng He, Tian Dong, Sören Schwertfeger

Figure 1 for Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets
Figure 2 for Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets
Figure 3 for Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets
Figure 4 for Towards Generation and Evaluation of Comprehensive Mapping Robot Datasets
Viaarxiv icon