Alert button
Picture for Zhuotao Liu

Zhuotao Liu

Alert button

Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption

Add code
Bookmark button
Alert button
Mar 17, 2024
Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu

Figure 1 for Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
Figure 2 for Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
Figure 3 for Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
Figure 4 for Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption
Viaarxiv icon

Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed

Add code
Bookmark button
Alert button
Mar 17, 2024
Jinzhu Yan, Haotian Xu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu, Jianping Wu

Figure 1 for Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed
Figure 2 for Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed
Figure 3 for Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed
Figure 4 for Brain-on-Switch: Towards Advanced Intelligent Network Data Plane via NN-Driven Traffic Analysis at Line-Speed
Viaarxiv icon

Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach

Add code
Bookmark button
Alert button
Mar 02, 2024
Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu

Figure 1 for Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach
Figure 2 for Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach
Figure 3 for Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach
Figure 4 for Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach
Viaarxiv icon

LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers

Add code
Bookmark button
Alert button
May 28, 2023
Xuanqi Liu, Zhuotao Liu

Figure 1 for LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers
Figure 2 for LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers
Figure 3 for LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers
Figure 4 for LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers
Viaarxiv icon

A Hard Label Black-box Adversarial Attack Against Graph Neural Networks

Add code
Bookmark button
Alert button
Aug 21, 2021
Jiaming Mu, Binghui Wang, Qi Li, Kun Sun, Mingwei Xu, Zhuotao Liu

Figure 1 for A Hard Label Black-box Adversarial Attack Against Graph Neural Networks
Figure 2 for A Hard Label Black-box Adversarial Attack Against Graph Neural Networks
Figure 3 for A Hard Label Black-box Adversarial Attack Against Graph Neural Networks
Figure 4 for A Hard Label Black-box Adversarial Attack Against Graph Neural Networks
Viaarxiv icon