Picture for Xiaoyong Yuan

Xiaoyong Yuan

Membership Inference Attacks and Defenses in Neural Network Pruning

Add code
Feb 07, 2022
Figure 1 for Membership Inference Attacks and Defenses in Neural Network Pruning
Figure 2 for Membership Inference Attacks and Defenses in Neural Network Pruning
Figure 3 for Membership Inference Attacks and Defenses in Neural Network Pruning
Figure 4 for Membership Inference Attacks and Defenses in Neural Network Pruning
Viaarxiv icon

FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning

Add code
Sep 08, 2021
Figure 1 for FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning
Figure 2 for FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning
Figure 3 for FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning
Figure 4 for FedZKT: Zero-Shot Knowledge Transfer towards Heterogeneous On-Device Models in Federated Learning
Viaarxiv icon

A Vertical Federated Learning Framework for Horizontally Partitioned Labels

Add code
Jun 18, 2021
Figure 1 for A Vertical Federated Learning Framework for Horizontally Partitioned Labels
Figure 2 for A Vertical Federated Learning Framework for Horizontally Partitioned Labels
Figure 3 for A Vertical Federated Learning Framework for Horizontally Partitioned Labels
Figure 4 for A Vertical Federated Learning Framework for Horizontally Partitioned Labels
Viaarxiv icon

ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles

Add code
Sep 21, 2020
Figure 1 for ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Figure 2 for ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Figure 3 for ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Figure 4 for ES Attack: Model Stealing against Deep Neural Networks without Data Hurdles
Viaarxiv icon

Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks

Add code
Sep 07, 2020
Figure 1 for Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Figure 2 for Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Figure 3 for Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Figure 4 for Connecting Web Event Forecasting with Anomaly Detection: A Case Study on Enterprise Web Applications Using Self-Supervised Neural Networks
Viaarxiv icon

Generalized Batch Normalization: Towards Accelerating Deep Neural Networks

Add code
Dec 08, 2018
Figure 1 for Generalized Batch Normalization: Towards Accelerating Deep Neural Networks
Figure 2 for Generalized Batch Normalization: Towards Accelerating Deep Neural Networks
Figure 3 for Generalized Batch Normalization: Towards Accelerating Deep Neural Networks
Figure 4 for Generalized Batch Normalization: Towards Accelerating Deep Neural Networks
Viaarxiv icon

Adaptive Adversarial Attack on Scene Text Recognition

Add code
Jul 09, 2018
Figure 1 for Adaptive Adversarial Attack on Scene Text Recognition
Figure 2 for Adaptive Adversarial Attack on Scene Text Recognition
Figure 3 for Adaptive Adversarial Attack on Scene Text Recognition
Figure 4 for Adaptive Adversarial Attack on Scene Text Recognition
Viaarxiv icon

Adversarial Examples: Attacks and Defenses for Deep Learning

Add code
Jul 07, 2018
Figure 1 for Adversarial Examples: Attacks and Defenses for Deep Learning
Figure 2 for Adversarial Examples: Attacks and Defenses for Deep Learning
Figure 3 for Adversarial Examples: Attacks and Defenses for Deep Learning
Figure 4 for Adversarial Examples: Attacks and Defenses for Deep Learning
Viaarxiv icon

Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection

Add code
Dec 04, 2017
Figure 1 for Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection
Figure 2 for Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection
Figure 3 for Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection
Figure 4 for Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection
Viaarxiv icon