关注
Dai Xuelong
Dai Xuelong
在 connect.polyu.hk 的电子邮件经过验证
标题
引用次数
引用次数
年份
Semantic-aware multi-keyword ranked search scheme over encrypted cloud data
H Dai, X Dai, X Yi, G Yang, H Huang
Journal of Network and Computer Applications 147, 102442, 2019
282019
Physical-world optical adversarial attacks on 3d face recognition
Y Li, Y Li, X Dai, S Guo, B Xiao
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2023
242023
An efficient and dynamic semantic-aware multikeyword ranked search scheme over encrypted cloud data
X Dai, H Dai, G Yang, X Yi, H Huang
IEEE Access 7, 142855-142865, 2019
192019
Enhanced semantic-aware multi-keyword ranked search scheme over encrypted cloud data
X Dai, H Dai, C Rong, G Yang, F Xiao, B Xiao
IEEE Transactions on Cloud Computing 10 (4), 2595-2612, 2020
142020
Advdiff: Generating unrestricted adversarial examples using diffusion models
X Dai, K Liang, B Xiao
arXiv preprint arXiv:2307.12499, 2023
92023
Long-term cross adversarial training: A robust meta-learning method for few-shot classification tasks
F Liu, S Zhao, X Dai, B Xiao
arXiv preprint arXiv:2106.12900, 2021
82021
A Multibranch Search Tree‐Based Multi‐Keyword Ranked Search Scheme over Encrypted Cloud Data
H Dai, X Dai, X Li, X Yi, F Xiao, G Yang
Security and Communication Networks 2020 (1), 7307315, 2020
72020
Generating unrestricted 3d adversarial point clouds
X Dai, Y Li, H Dai, B Xiao
arXiv preprint arXiv:2111.08973, 2021
22021
Transferable 3D Adversarial Shape Completion using Diffusion Models
X Dai, B Xiao
arXiv preprint arXiv:2407.10077, 2024
2024
Generating Transferable and Stealthy Adversarial Patch via Attention-guided Adversarial Inpainting
Y Li, D Mingxing, X Dai, B Xiao
Diffusion Models as Strong Adversaries
X Dai, Y Li, D Mingxing, B Xiao
系统目前无法执行此操作,请稍后再试。
文章 1–11