Alert button
Picture for Xiaolin Chang

Xiaolin Chang

Alert button

CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning

Add code
Bookmark button
Alert button
Jun 07, 2023
Jianhua Wang, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Lin Li, Yingying Yao

Figure 1 for CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning
Figure 2 for CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning
Figure 3 for CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning
Viaarxiv icon

DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks

Add code
Bookmark button
Alert button
Oct 14, 2021
Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jianhua Wang, Ricardo J. Rodríguez

Figure 1 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Figure 2 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Figure 3 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Figure 4 for DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks
Viaarxiv icon

IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks

Add code
Bookmark button
Alert button
Feb 03, 2021
Yixiang Wang, Jiqiang Liu, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić

Figure 1 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Figure 2 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Figure 3 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Figure 4 for IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks
Viaarxiv icon

A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion

Add code
Bookmark button
Alert button
Jan 31, 2021
Yuzhou Lin, Xiaolin Chang

Figure 1 for A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion
Figure 2 for A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion
Figure 3 for A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion
Figure 4 for A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion
Viaarxiv icon

Generalizing Adversarial Examples by AdaBelief Optimizer

Add code
Bookmark button
Alert button
Jan 25, 2021
Yixiang Wang, Jiqiang Liu, Xiaolin Chang

Figure 1 for Generalizing Adversarial Examples by AdaBelief Optimizer
Figure 2 for Generalizing Adversarial Examples by AdaBelief Optimizer
Viaarxiv icon

Towards interpreting ML-based automated malware detection models: a survey

Add code
Bookmark button
Alert button
Jan 15, 2021
Yuzhou Lin, Xiaolin Chang

Figure 1 for Towards interpreting ML-based automated malware detection models: a survey
Figure 2 for Towards interpreting ML-based automated malware detection models: a survey
Figure 3 for Towards interpreting ML-based automated malware detection models: a survey
Figure 4 for Towards interpreting ML-based automated malware detection models: a survey
Viaarxiv icon

Towards Interpretable Ensemble Learning for Image-based Malware Detection

Add code
Bookmark button
Alert button
Jan 13, 2021
Yuzhou Lin, Xiaolin Chang

Figure 1 for Towards Interpretable Ensemble Learning for Image-based Malware Detection
Figure 2 for Towards Interpretable Ensemble Learning for Image-based Malware Detection
Figure 3 for Towards Interpretable Ensemble Learning for Image-based Malware Detection
Figure 4 for Towards Interpretable Ensemble Learning for Image-based Malware Detection
Viaarxiv icon