Alert button
Picture for Ting Wang

Ting Wang

Alert button

Model-Contrastive Learning for Backdoor Defense

Add code
Bookmark button
Alert button
May 09, 2022
Zhihao Yue, Jun Xia, Zhiwei Ling, Ting Wang, Xian Wei, Mingsong Chen

Figure 1 for Model-Contrastive Learning for Backdoor Defense
Figure 2 for Model-Contrastive Learning for Backdoor Defense
Figure 3 for Model-Contrastive Learning for Backdoor Defense
Figure 4 for Model-Contrastive Learning for Backdoor Defense
Viaarxiv icon

Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation

Add code
Bookmark button
Alert button
Apr 24, 2022
Jun Xia, Ting Wang, Jiepin Ding, Xian Wei, Mingsong Chen

Figure 1 for Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation
Figure 2 for Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation
Figure 3 for Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation
Figure 4 for Eliminating Backdoor Triggers for Deep Neural Networks Using Attention Relation Graph Distillation
Viaarxiv icon

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings

Add code
Bookmark button
Alert button
Apr 07, 2022
Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang

Figure 1 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Figure 2 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Figure 3 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Figure 4 for Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Viaarxiv icon

Over-the-Air Federated Learning via Second-Order Optimization

Add code
Bookmark button
Alert button
Mar 29, 2022
Peng Yang, Yuning Jiang, Ting Wang, Yong Zhou, Yuanming Shi, Colin N. Jones

Figure 1 for Over-the-Air Federated Learning via Second-Order Optimization
Figure 2 for Over-the-Air Federated Learning via Second-Order Optimization
Figure 3 for Over-the-Air Federated Learning via Second-Order Optimization
Figure 4 for Over-the-Air Federated Learning via Second-Order Optimization
Viaarxiv icon

Machine Learning Empowered Intelligent Data Center Networking: A Survey

Add code
Bookmark button
Alert button
Mar 01, 2022
Bo Li, Ting Wang, Peng Yang, Mingsong Chen, Shui Yu, Mounir Hamdi

Figure 1 for Machine Learning Empowered Intelligent Data Center Networking: A Survey
Figure 2 for Machine Learning Empowered Intelligent Data Center Networking: A Survey
Figure 3 for Machine Learning Empowered Intelligent Data Center Networking: A Survey
Figure 4 for Machine Learning Empowered Intelligent Data Center Networking: A Survey
Viaarxiv icon

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era

Add code
Bookmark button
Alert button
Feb 22, 2022
Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang

Figure 1 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 2 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 3 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Figure 4 for Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Viaarxiv icon

Towards Fast and Accurate Federated Learning with non-IID Data for Cloud-Based IoT Applications

Add code
Bookmark button
Alert button
Jan 29, 2022
Tian Liu, Jiahao Ding, Ting Wang, Miao Pan, Mingsong Chen

Figure 1 for Towards Fast and Accurate Federated Learning with non-IID Data for Cloud-Based IoT Applications
Figure 2 for Towards Fast and Accurate Federated Learning with non-IID Data for Cloud-Based IoT Applications
Figure 3 for Towards Fast and Accurate Federated Learning with non-IID Data for Cloud-Based IoT Applications
Figure 4 for Towards Fast and Accurate Federated Learning with non-IID Data for Cloud-Based IoT Applications
Viaarxiv icon

CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing

Add code
Bookmark button
Alert button
Dec 24, 2021
Haibo Jin, Ruoxi Chen, Jinyin Chen, Yao Cheng, Chong Fu, Ting Wang, Yue Yu, Zhaoyan Ming

Figure 1 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Figure 2 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Figure 3 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Figure 4 for CatchBackdoor: Backdoor Testing by Critical Trojan Neural Path Identification via Differential Fuzzing
Viaarxiv icon

MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare

Add code
Bookmark button
Alert button
Dec 11, 2021
Muchao Ye, Junyu Luo, Guanjie Zheng, Cao Xiao, Ting Wang, Fenglong Ma

Figure 1 for MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare
Figure 2 for MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare
Figure 3 for MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare
Figure 4 for MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare
Viaarxiv icon