Privacy-preserving collaborative deep learning with unreliable participants L Zhao, Q Wang, Q Zou, Y Zhang, Y Chen IEEE Transactions on Information Forensics and Security 15, 1486-1500, 2019 | 198 | 2019 |
Inprivate digging: Enabling tree-based distributed data mining with differential privacy L Zhao, L Ni, S Hu, Y Chen, P Zhou, F Xiao, L Wu IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 2087-2095, 2018 | 115 | 2018 |
Shielding collaborative learning: Mitigating poisoning attacks through client-side detection L Zhao, S Hu, Q Wang, J Jiang, C Shen, X Luo, P Hu IEEE Transactions on Dependable and Secure Computing 18 (5), 2029-2041, 2020 | 112 | 2020 |
Veriml: Enabling integrity assurances and fair payments for machine learning as a service L Zhao, Q Wang, C Wang, Q Li, C Shen, B Feng IEEE Transactions on Parallel and Distributed Systems 32 (10), 2524-2540, 2021 | 96 | 2021 |
Sear: Secure and efficient aggregation for byzantine-robust federated learning L Zhao, J Jiang, B Feng, Q Wang, C Shen, Q Li IEEE Transactions on Dependable and Secure Computing 19 (5), 3329-3342, 2021 | 73 | 2021 |
Deep domain adaptation with differential privacy Q Wang, Z Li, Q Zou, L Zhao, S Wang IEEE Transactions on Information Forensics and Security 15, 3093-3106, 2020 | 29 | 2020 |
Differential privacy in deep learning: Privacy and beyond Y Wang, Q Wang, L Zhao, C Wang Future Generation Computer Systems 148, 408-424, 2023 | 14 | 2023 |
AdvDDoS: Zero-query adversarial attacks against commercial speech recognition systems Y Ge, L Zhao, Q Wang, Y Duan, M Du IEEE Transactions on Information Forensics and Security 18, 3647-3661, 2023 | 8 | 2023 |
Revisiting adversarial robustness distillation from the perspective of robust fairness X Yue, M Ningping, Q Wang, L Zhao Advances in Neural Information Processing Systems 36, 2024 | 7 | 2024 |
Shielding graph for eXact analytics with SGX M Du, P Jiang, Q Wang, SSM Chow, L Zhao IEEE Transactions on Dependable and Secure Computing 20 (6), 5102-5112, 2023 | 4 | 2023 |
MiDA: Membership inference attacks against domain adaptation Y Zhang, L Zhao, Q Wang ISA transactions 141, 103-112, 2023 | 3 | 2023 |
Practical differentially private online advertising J Sun, L Zhao, Z Liu, Q Li, X Deng, Q Wang, Y Jiang Computers & Security 112, 102504, 2022 | 3 | 2022 |
FastTextDodger: Decision-Based Adversarial Attack Against Black-Box NLP Models With Extremely High Efficiency X Hu, G Liu, B Zheng, L Zhao, Q Wang, Y Zhang, M Du IEEE Transactions on Information Forensics and Security, 2024 | 2 | 2024 |
Perception-driven Imperceptible Adversarial Attack against Decision-based Black-box Models S Zhang, B Zheng, P Jiang, L Zhao, C Shen, Q Wang IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
Revisiting Video Quality Assessment from the Perspective of Generalization X Yue, J Sun, L Yao, F Xia, Y Deng, T Wang, L Li, F Rao, J Lv, Q Wang, ... arXiv preprint arXiv:2409.14847, 2024 | | 2024 |
Advancing Video Quality Assessment for AIGC X Yue, J Sun, H Kong, L Yao, T Wang, L Li, F Rao, J Lv, F Xia, Y Deng, ... arXiv preprint arXiv:2409.14888, 2024 | | 2024 |
Zero-Query Adversarial Attack on Black-box Automatic Speech Recognition Systems Z Fang, T Wang, L Zhao, S Zhang, B Li, Y Ge, Q Li, C Shen, Q Wang arXiv preprint arXiv:2406.19311, 2024 | | 2024 |
Enhancing Adversarial Transferability Through Neighborhood Conditional Sampling C Qiu, Y Duan, L Zhao, Q Wang arXiv preprint arXiv:2405.16181, 2024 | | 2024 |
Hijacking Attacks against Neural Networks by Analyzing Training Data Y Ge, Q Wang, H Huang, Q Li, C Wang, C Shen, L Zhao, P Jiang, Z Fang, ... arXiv preprint arXiv:2401.09740, 2024 | | 2024 |
More Simplicity for Trainers, More Opportunity for Attackers:{Black-Box} Attacks on Speaker Recognition Systems by Inferring Feature Extractor Y Ge, P Chen, Q Wang, L Zhao, N Mou, P Jiang, C Wang, Q Li, C Shen 33rd USENIX Security Symposium (USENIX Security 24), 2973-2990, 2024 | | 2024 |