shuai zhou
shuai zhou
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity
S Zhou, C Liu, D Ye, T Zhu, W Zhou, PS Yu
ACM Computing Surveys 55 (8), 1-39, 2022
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope
S Zhou, H Xue, D Zhang, K Wang, X Lu, B Li, J He
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
Label-only model inversion attacks: Attack with the least information
T Zhu, D Ye, S Zhou, B Liu, W Zhou
IEEE Transactions on Information Forensics and Security 18, 991-1005, 2022
Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Vertical Federated Learning
X Chen, S Zhou, B Guan, K Yang, H Fao, H Wang, Y Wang
2021 IEEE International Conference on Big Data (Big Data), 1242-1248, 2021
Boosting Model Inversion Attacks with Adversarial Examples
S Zhou, T Zhu, D Ye, X Yu, W Zhou
IEEE Transactions on Dependable and Secure Computing, 2023
Label-only Model Inversion Attack: The Attack that Requires the Least Information
D Ye, T Zhu, S Zhou, B Liu, W Zhou
arXiv preprint arXiv:2203.06555, 2022
Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It
D Ye, H Chen, S Zhou, T Zhu, W Zhou, S Ji
arXiv preprint arXiv:2203.06570, 2022
Inversion-guided Defense: Detecting Model Stealing Attacks by Output Inverting
S Zhou, T Zhu, D Ye, W Zhou, W Zhao
IEEE Transactions on Information Forensics and Security, 2024
SecureBP from homomorphic encryption
Q Liu, X Lu, F Luo, S Zhou, J He, K Wang
Security and Communication Networks 2020 (1), 5328059, 2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–9