Picture for Yuwen Qian

Yuwen Qian

EmInspector: Combating Backdoor Attacks in Federated Self-Supervised Learning Through Embedding Inspection

Add code
May 21, 2024
Viaarxiv icon

Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction

Add code
Dec 01, 2023
Figure 1 for Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction
Figure 2 for Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction
Figure 3 for Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction
Figure 4 for Refine, Discriminate and Align: Stealing Encoders via Sample-Wise Prototypes and Multi-Relational Extraction
Viaarxiv icon

Sparse Federated Training of Object Detection in the Internet of Vehicles

Add code
Sep 07, 2023
Figure 1 for Sparse Federated Training of Object Detection in the Internet of Vehicles
Figure 2 for Sparse Federated Training of Object Detection in the Internet of Vehicles
Figure 3 for Sparse Federated Training of Object Detection in the Internet of Vehicles
Figure 4 for Sparse Federated Training of Object Detection in the Internet of Vehicles
Viaarxiv icon

Personalized Federated Deep Reinforcement Learning-based Trajectory Optimization for Multi-UAV Assisted Edge Computing

Add code
Sep 05, 2023
Viaarxiv icon

Design of Two-Level Incentive Mechanisms for Hierarchical Federated Learning

Add code
Apr 09, 2023
Figure 1 for Design of Two-Level Incentive Mechanisms for Hierarchical Federated Learning
Figure 2 for Design of Two-Level Incentive Mechanisms for Hierarchical Federated Learning
Figure 3 for Design of Two-Level Incentive Mechanisms for Hierarchical Federated Learning
Figure 4 for Design of Two-Level Incentive Mechanisms for Hierarchical Federated Learning
Viaarxiv icon

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic

Add code
Feb 27, 2023
Figure 1 for Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
Figure 2 for Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
Figure 3 for Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
Figure 4 for Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic
Viaarxiv icon

Path Planning for the Dynamic UAV-Aided Wireless Systems using Monte Carlo Tree Search

Add code
Jan 13, 2022
Figure 1 for Path Planning for the Dynamic UAV-Aided Wireless Systems using Monte Carlo Tree Search
Figure 2 for Path Planning for the Dynamic UAV-Aided Wireless Systems using Monte Carlo Tree Search
Figure 3 for Path Planning for the Dynamic UAV-Aided Wireless Systems using Monte Carlo Tree Search
Figure 4 for Path Planning for the Dynamic UAV-Aided Wireless Systems using Monte Carlo Tree Search
Viaarxiv icon