Alert button
Picture for Xingliang Yuan

Xingliang Yuan

Alert button

Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization

Add code
Bookmark button
Alert button
Oct 24, 2020
Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan

Figure 1 for Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Figure 2 for Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Figure 3 for Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Figure 4 for Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization
Viaarxiv icon

Federated Learning for 6G Communications: Challenges, Methods, and Future Directions

Add code
Bookmark button
Alert button
Jun 04, 2020
Yi Liu, Xingliang Yuan, Zehui Xiong, Jiawen Kang, Xiaofei Wang, Dusit Niyato

Figure 1 for Federated Learning for 6G Communications: Challenges, Methods, and Future Directions
Figure 2 for Federated Learning for 6G Communications: Challenges, Methods, and Future Directions
Figure 3 for Federated Learning for 6G Communications: Challenges, Methods, and Future Directions
Figure 4 for Federated Learning for 6G Communications: Challenges, Methods, and Future Directions
Viaarxiv icon

Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets

Add code
Bookmark button
Alert button
Nov 14, 2019
Shangqi Lai, Xingliang Yuan, Amin Sakzad, Mahsa Salehi, Joseph K. Liu, Dongxi Liu

Figure 1 for Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets
Figure 2 for Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets
Figure 3 for Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets
Figure 4 for Enabling Efficient Privacy-Assured Outlier Detection over Encrypted Incremental Datasets
Viaarxiv icon

Defending Against Misclassification Attacks in Transfer Learning

Add code
Bookmark button
Alert button
Sep 12, 2019
Bang Wu, Xiangwen Yang, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph

Figure 1 for Defending Against Misclassification Attacks in Transfer Learning
Figure 2 for Defending Against Misclassification Attacks in Transfer Learning
Figure 3 for Defending Against Misclassification Attacks in Transfer Learning
Figure 4 for Defending Against Misclassification Attacks in Transfer Learning
Viaarxiv icon