关注
Xueluan Gong
Xueluan Gong
在 whu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Model extraction attacks and defenses on cloud-based machine learning models
X Gong, Q Wang, Y Chen, W Yang, X Jiang
IEEE Communications Magazine 58 (12), 83-89, 2020
412020
Backdoor attacks and defenses in federated learning: State-of-the-art, taxonomy, and future directions
X Gong, Y Chen, Q Wang, W Kong
IEEE Wireless Communications 30 (2), 114-121, 2022
352022
InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion.
X Gong, Y Chen, W Yang, G Mei, Q Wang
IJCAI, 2439-2447, 2021
342021
Defense-resistant backdoor attacks against deep neural networks in outsourced cloud environment
X Gong, Y Chen, Q Wang, H Huang, L Meng, C Shen, Q Zhang
IEEE Journal on Selected Areas in Communications 39 (8), 2617-2631, 2021
342021
Coordinated backdoor attacks against federated learning with model-dependent triggers
X Gong, Y Chen, H Huang, Y Liao, S Wang, Q Wang
IEEE network 36 (1), 84-90, 2022
302022
Backdoor attacks and defenses for deep neural networks in outsourced cloud environments
Y Chen, X Gong, Q Wang, X Di, H Huang
IEEE Network 34 (5), 141-147, 2020
292020
Marnet: Backdoor attacks against cooperative multi-agent reinforcement learning
Y Chen, Z Zheng, X Gong
IEEE Transactions on Dependable and Secure Computing, 2022
182022
Crowdcaching: Incentivizing D2D-enabled caching via coalitional game for IoT
Y Chen, X Gong, R Ou, L Duan, Q Zhang
IEEE Internet of Things Journal 7 (6), 5599-5612, 2020
182020
MPCN-RP: A routing protocol for blockchain-based multi-charge payment channel networks
Y Chen, Y Ran, J Zhou, J Zhang, X Gong
IEEE Transactions on Network and Service Management 19 (2), 1229-1242, 2021
152021
D-dae: Defense-penetrating model extraction attacks
Y Chen, R Guan, X Gong, J Dong, M Xue
2023 IEEE Symposium on Security and Privacy (SP), 382-399, 2023
122023
Private data inference attacks against cloud: Model, technologies, and research directions
X Gong, Y Chen, Q Wang, M Wang, S Li
IEEE Communications Magazine 60 (9), 46-52, 2022
122022
Data poisoning attacks in internet-of-vehicle networks: Taxonomy, state-of-the-art, and future directions
Y Chen, X Zhu, X Gong, X Yi, S Li
IEEE Transactions on Industrial Informatics 19 (1), 20-28, 2022
102022
ATTEQ-NN: Attention based QoE-aware evasive backdoor attacks
X Gong, Y Chen, J Dong, Q Wang
Annual Network and Distributed System Security Symposium. The Internet Society, 2022
102022
Redeem myself: Purifying backdoors in deep learning models using self attention distillation
X Gong, Y Chen, W Yang, Q Wang, Y Gu, H Huang, C Shen
2023 IEEE Symposium on Security and Privacy (SP), 755-772, 2023
72023
Kaleidoscope: Physical backdoor attacks against deep neural networks with RGB filters
X Gong, Z Wang, Y Chen, M Xue, Q Wang, C Shen
IEEE Transactions on Dependable and Secure Computing, 2023
62023
B3: Backdoor Attacks against Black-box Machine Learning Models
X Gong, Y Chen, W Yang, H Huang, Q Wang
ACM Transactions on Privacy and Security 26 (4), 1-24, 2023
42023
A gan-based defense framework against model inversion attacks
X Gong, Z Wang, S Li, Y Chen, Q Wang
IEEE Transactions on Information Forensics and Security, 2023
42023
Catch You and I Can: Revealing source voiceprint against voice conversion
J Deng, Y Chen, Y Zhong, Q Miao, X Gong, W Xu
32nd USENIX Security Symposium (USENIX Security 23), 5163-5180, 2023
32023
Wet-Ra: Monitoring Diapers Wetness with Wireless Signals
M Xue, Y Chen, X Gong, J Zhang, C Fan
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2022
32022
A survey of adversarial attacks on wireless communications
X Luo, Q Qin, X Gong, M Xue
International Conference on Edge Computing and IoT, 83-91, 2021
32021
系统目前无法执行此操作,请稍后再试。
文章 1–20