关注
Jianshuo Dong
Jianshuo Dong
在 mails.tsinghua.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
D-dae: Defense-penetrating model extraction attacks
Y Chen, R Guan, X Gong, J Dong, M Xue
2023 IEEE Symposium on Security and Privacy (SP), 382-399, 2023
192023
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks.
X Gong, Y Chen, J Dong, Q Wang
NDSS, 2022
142022
One-bit flip is all you need: When bit-flip attack meets model training
J Dong, H Qiu, Y Li, T Zhang, Y Li, Z Lai, C Zhang, ST Xia
Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2023
72023
Adversarial examples in wireless networks: a comprehensive survey
JS Dong, X Gong, M Xue
International Conference on Edge Computing and IoT, 92-97, 2021
32021
SwiftTheft: A Time-Efficient Model Extraction Attack Framework Against Cloud-Based Deep Neural Networks
W Yang, X Gong, Y Chen, Q Wang, J Dong, Y Li
Chinese Journal of Electronics 33 (1), 90-100, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–5