Dataset distillation: A comprehensive review

R Yu, S Liu, X Wang - IEEE Transactions on Pattern Analysis …, 2023 - ieeexplore.ieee.org
Recent success of deep learning is largely attributed to the sheer amount of data used for
training deep neural networks. Despite the unprecedented success, the massive data …

An overview of backdoor attacks against deep neural networks and possible defences

W Guo, B Tondi, M Barni - IEEE Open Journal of Signal …, 2022 - ieeexplore.ieee.org
Together with impressive advances touching every aspect of our society, AI technology
based on Deep Neural Networks (DNN) is bringing increasing security concerns. While …

Backdoor attacks against voice recognition systems: A survey

B Yan, J Lan, Z Yan - ACM Computing Surveys, 2024 - dl.acm.org
Voice Recognition Systems (VRSs) employ deep learning for speech recognition and
speaker recognition. They have been widely deployed in various real-world applications …

Tijo: Trigger inversion with joint optimization for defending multimodal backdoored models

I Sur, K Sikka, M Walmer… - Proceedings of the …, 2023 - openaccess.thecvf.com
Abstract We present a Multimodal Backdoor defense technique TIJO (Trigger Inversion
using Joint Optimization). Recently Walmer et al. demonstrated successful backdoor attacks …

Backdoor attacks against dataset distillation

Y Liu, Z Li, M Backes, Y Shen, Y Zhang - arXiv preprint arXiv:2301.01197, 2023 - arxiv.org
Dataset distillation has emerged as a prominent technique to improve data efficiency when
training machine learning models. It encapsulates the knowledge from a large dataset into a …

Resource Management, Security, and Privacy Issues in Semantic Communications: A Survey

D Won, G Woraphonbenjakul… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Resource management, security, and privacy stand as fundamental pillars for the reliable
and secure operation of efficient semantic communications (SC) system. By addressing …

A novel image recognition method based on DenseNet and DPRN

L Yin, P Hong, G Zheng, H Chen, W Deng - Applied Sciences, 2022 - mdpi.com
Image recognition is one of the important branches of computer vision, which has important
theoretical and practical significance. For the insufficient use of features, the single type of …

Log sequence anomaly detection method based on contrastive adversarial training and dual feature extraction

Q Wang, X Zhang, X Wang, Z Cao - Entropy, 2021 - mdpi.com
The log messages generated in the system reflect the state of the system at all times. The
realization of autonomous detection of abnormalities in log messages can help operators …

CAEVT: Convolutional autoencoder meets lightweight vision transformer for hyperspectral image classification

Z Zhang, T Li, X Tang, X Hu, Y Peng - Sensors, 2022 - mdpi.com
Convolutional neural networks (CNNs) have been prominent in most hyperspectral image
(HSI) processing applications due to their advantages in extracting local information …

Privacy-preserving decentralized federated learning over time-varying communication graph

Y Lu, Z Yu, N Suri - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
Establishing how a set of learners can provide privacy-preserving federated learning in a
fully decentralized (peer-to-peer, no coordinator) manner is an open problem. We propose …