Segui
Xiaoyu Zhang
Xiaoyu Zhang
Email verificata su xidian.edu.cn
Titolo
Citata da
Citata da
Anno
DeepPAR and DeepDPA: privacy preserving and asynchronous deep learning for industrial IoT
X Zhang, X Chen, JK Liu, Y Xiang
IEEE Transactions on Industrial Informatics 16 (3), 2081-2090, 2019
932019
Non-interactive privacy-preserving neural network prediction
X Ma, X Chen, X Zhang
Information Sciences 481, 507-519, 2019
592019
New publicly verifiable computation for batch matrix multiplication
X Zhang, T Jiang, KC Li, A Castiglione, X Chen
Information Sciences 479, 664-678, 2019
572019
DedupDUM: Secure and scalable data deduplication with dynamic user management
H Yuan, X Chen, T Jiang, X Zhang, Z Yan, Y Xiang
Information Sciences 456, 159-173, 2018
512018
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing
X Zhang, X Chen, J Wang, Z Zhan, J Li
Soft Computing 22, 7719-7732, 2018
362018
Privacy-preserving and verifiable online crowdsourcing with worker updates
X Zhang, X Chen, H Yan, Y Xiang
Information Sciences 548, 212-232, 2021
242021
Secure multiparty learning from the aggregation of locally trained models
X Ma, C Ji, X Zhang, J Wang, J Li, KC Li, X Chen
Journal of Network and Computer Applications 167, 102754, 2020
242020
A survey on privacy inference attacks and defenses in cloud-based deep neural network
X Zhang, C Chen, Y Xie, X Chen, J Zhang, Y Xiang
Computer Standards & Interfaces 83, 103672, 2023
172023
Erm-ktp: Knowledge-level machine unlearning via knowledge transfer
S Lin, X Zhang, C Chen, X Chen, W Susilo
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2023
152023
Privacy inference attacks and defenses in cloud-based deep neural network: A survey
X Zhang, C Chen, Y Xie, X Chen, J Zhang, Y Xiang
arXiv preprint arXiv:2105.06300, 2021
82021
Purifier: Plug-and-play backdoor mitigation for pre-trained models via anomaly activation suppression
X Zhang, Y Jin, T Wang, J Lou, X Chen
Proceedings of the 30th ACM International Conference on Multimedia, 4291-4299, 2022
52022
Membership inference attacks against robust graph neural network
Z Liu, X Zhang, C Chen, S Lin, J Li
International Symposium on Cyberspace Safety and Security, 259-273, 2022
42022
A Survey on Secure Outsourced Deep Learning
X Ma, X Zhang, C Dong, X Chen
Cyber Security Meets Machine Learning, 129-163, 2021
42021
EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing
J Wang, X Zhang, X Tao, J Wang
Journal of High Speed Networks 24 (3), 259-279, 2018
42018
Security Analysis of``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''
J Wang, X Zhang, J Wang
Cryptology ePrint Archive, 2017
42017
Game: Generative-based adaptive model extraction attack
Y Xie, M Huang, X Zhang, C Dong, W Susilo, X Chen
European Symposium on Research in Computer Security, 570-588, 2022
32022
MODA: Model Ownership Deprivation Attack in Asynchronous Federated Learning
X Zhang, S Lin, C Chen, X Chen
IEEE Transactions on Dependable and Secure Computing, 2023
22023
Closed-form machine unlearning for matrix factorization
S Zhang, J Lou, L Xiong, X Zhang, J Liu
Proceedings of the 32nd ACM International Conference on Information and …, 2023
22023
ACQ: Few-shot Backdoor Defense via Activation Clipping and Quantizing
Y Jin, X Zhang, J Lou, X Chen
Proceedings of the 31st ACM International Conference on Multimedia, 5410-5418, 2023
12023
B2Opt: Learning to Optimize Black-box Optimization with Little Budget
X Li, K Wu, X Zhang, H Wang, J Liu
arXiv preprint arXiv:2304.11787, 2023
12023
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20