Dong Su
Dong Su
Alibaba Group
Bestätigte E-Mail-Adresse bei alibaba-inc.com
Titel
Zitiert von
Zitiert von
Jahr
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
N Li, W Qardaji, D Su
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
1912012
Privbasis: Frequent itemset mining with differential privacy
N Li, W Qardaji, D Su, J Cao
arXiv preprint arXiv:1208.0093, 2012
1842012
Evaluating the robustness of neural networks: An extreme value theory approach
TW Weng, H Zhang, PY Chen, J Yi, D Su, Y Gao, CJ Hsieh, L Daniel
arXiv preprint arXiv:1801.10578, 2018
1792018
Is Robustness the Cost of Accuracy?--A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
D Su, H Zhang, H Chen, J Yi, PY Chen, Y Gao
Proceedings of the European Conference on Computer Vision (ECCV), 631-648, 2018
1682018
Provably private data anonymization: Or, k-anonymity meets differential privacy
N Li, WH Qardaji, D Su
CoRR, abs/1101.2604 49, 55, 2011
1162011
Membership privacy: a unifying framework for privacy definitions
N Li, W Qardaji, D Su, Y Wu, W Yang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1142013
Differentially private k-means clustering
D Su, J Cao, N Li, E Bertino, H Jin
Proceedings of the sixth ACM conference on data and application security and …, 2016
1062016
Understanding the sparse vector technique for differential privacy
M Lyu, D Su, N Li
arXiv preprint arXiv:1603.01699, 2016
712016
Differential privacy: From theory to practice
N Li, M Lyu, D Su, W Yang
Synthesis Lectures on Information Security, Privacy, & Trust 8 (4), 1-138, 2016
622016
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 2018
28*2018
Defending against model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
242018
Differentially private k-means clustering and a hybrid approach to private optimization
D Su, J Cao, N Li, E Bertino, M Lyu, H Jin
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-33, 2017
222017
Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system
S Chari, H Gunasinghe, HM Krawczyk, A Kundu, KK Singh, D Su
US Patent 10,833,861, 2020
212020
Protection of confidentiality, privacy and financial fairness in a blockchain based decentralized identity management system
S Chari, H Gunasinghe, A Kundu, KK Singh, D Su
US Patent 10,715,317, 2020
172020
Privacy-preserving identity asset exchange
SN Chari, H Gunasinghe, A Kundu, KK Singh, D Su
US Patent 10,944,560, 2021
132021
Defending against machine learning model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
arXiv preprint arXiv:1806.00054, 2018
132018
Paillier’s trapdoor function hides Θ (n) bits
D Su, KW Lü
Science China Information Sciences 54 (9), 1827-1836, 2011
122011
Protecting Cognitive Systems from Model Stealing Attacks
T Lee, IM Molloy, D Su
US Patent App. 15/714,514, 2019
112019
Defending against neural network model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
102019
PrivPfC: differentially private data publication for classification
D Su, J Cao, N Li, M Lyu
The VLDB Journal 27 (2), 201-223, 2018
102018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20