DeepPAR and DeepDPA: privacy preserving and asynchronous deep learning for industrial IoT X Zhang, X Chen, JK Liu, Y Xiang IEEE Transactions on Industrial Informatics 16 (3), 2081-2090, 2019 | 93 | 2019 |
Non-interactive privacy-preserving neural network prediction X Ma, X Chen, X Zhang Information Sciences 481, 507-519, 2019 | 59 | 2019 |
New publicly verifiable computation for batch matrix multiplication X Zhang, T Jiang, KC Li, A Castiglione, X Chen Information Sciences 479, 664-678, 2019 | 57 | 2019 |
DedupDUM: Secure and scalable data deduplication with dynamic user management H Yuan, X Chen, T Jiang, X Zhang, Z Yan, Y Xiang Information Sciences 456, 159-173, 2018 | 51 | 2018 |
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing X Zhang, X Chen, J Wang, Z Zhan, J Li Soft Computing 22, 7719-7732, 2018 | 36 | 2018 |
Privacy-preserving and verifiable online crowdsourcing with worker updates X Zhang, X Chen, H Yan, Y Xiang Information Sciences 548, 212-232, 2021 | 24 | 2021 |
Secure multiparty learning from the aggregation of locally trained models X Ma, C Ji, X Zhang, J Wang, J Li, KC Li, X Chen Journal of Network and Computer Applications 167, 102754, 2020 | 24 | 2020 |
A survey on privacy inference attacks and defenses in cloud-based deep neural network X Zhang, C Chen, Y Xie, X Chen, J Zhang, Y Xiang Computer Standards & Interfaces 83, 103672, 2023 | 17 | 2023 |
Erm-ktp: Knowledge-level machine unlearning via knowledge transfer S Lin, X Zhang, C Chen, X Chen, W Susilo Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023 | 15 | 2023 |
Privacy inference attacks and defenses in cloud-based deep neural network: A survey X Zhang, C Chen, Y Xie, X Chen, J Zhang, Y Xiang arXiv preprint arXiv:2105.06300, 2021 | 8 | 2021 |
Purifier: Plug-and-play backdoor mitigation for pre-trained models via anomaly activation suppression X Zhang, Y Jin, T Wang, J Lou, X Chen Proceedings of the 30th ACM International Conference on Multimedia, 4291-4299, 2022 | 5 | 2022 |
Membership inference attacks against robust graph neural network Z Liu, X Zhang, C Chen, S Lin, J Li International Symposium on Cyberspace Safety and Security, 259-273, 2022 | 4 | 2022 |
A Survey on Secure Outsourced Deep Learning X Ma, X Zhang, C Dong, X Chen Cyber Security Meets Machine Learning, 129-163, 2021 | 4 | 2021 |
EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing J Wang, X Zhang, X Tao, J Wang Journal of High Speed Networks 24 (3), 259-279, 2018 | 4 | 2018 |
Security Analysis of``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare'' J Wang, X Zhang, J Wang Cryptology ePrint Archive, 2017 | 4 | 2017 |
Game: Generative-based adaptive model extraction attack Y Xie, M Huang, X Zhang, C Dong, W Susilo, X Chen European Symposium on Research in Computer Security, 570-588, 2022 | 3 | 2022 |
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning X Zhang, S Lin, C Chen, X Chen IEEE Transactions on Dependable and Secure Computing, 2023 | 2 | 2023 |
Closed-form machine unlearning for matrix factorization S Zhang, J Lou, L Xiong, X Zhang, J Liu Proceedings of the 32nd ACM International Conference on Information and …, 2023 | 2 | 2023 |
ACQ: Few-shot Backdoor Defense via Activation Clipping and Quantizing Y Jin, X Zhang, J Lou, X Chen Proceedings of the 31st ACM International Conference on Multimedia, 5410-5418, 2023 | 1 | 2023 |
B2Opt: Learning to Optimize Black-box Optimization with Little Budget X Li, K Wu, X Zhang, H Wang, J Liu arXiv preprint arXiv:2304.11787, 2023 | 1 | 2023 |