دنبال کردن
XiaoJun Chen
عنوان
نقل شده توسط
نقل شده توسط
سال
Eastfly: Efficient and secure ternary federated learning
Y Dong, X Chen, L Shen, D Wang
Computers & Security 94, 101824, 2020
1062020
Defeat: Deep hidden feature backdoor attacks by imperceptible perturbation and latent representation constraints
Z Zhao, X Chen, Y Xuan, Y Dong, D Wang, K Liang
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
922022
A survey on collaborative deep learning and privacy-preserving
D Zhang, X Chen, D Wang, J Shi
2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018
882018
A bigram based real time DNS tunnel detection approach
C Qi, X Chen, C Xu, J Shi, P Liu
Procedia Computer Science 17, 852-860, 2013
842013
: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority
Y Dong, X Chen, K Li, D Wang, S Zeng
European Symposium on Research in Computer Security, 497-518, 2021
652021
Inferring attack intent of malicious insider based on probabilistic attack graph model
XJ Chen, BX Fang, QF Tan, H Zhang
Chinese Journal of Computers 37 (1), 62-72, 2014
432014
Privacy-preserving distributed machine learning based on secret sharing
Y Dong, X Chen, L Shen, D Wang
Information and Communications Security: 21st International Conference …, 2020
292020
Abstractive text summarization with multi-head attention
J Li, C Zhang, X Chen, Y Cao, P Liao, P Zhang
2019 international joint conference on neural networks (ijcnn), 1-8, 2019
252019
Survey on automatic text summarization
J Li, C Zhang, X Chen, Y Hu, P Liao
Journal of computer research and development 58 (01), 1-21, 2021
242021
CLTS: a new Chinese long text summarization dataset
X Liu, C Zhang, X Chen, Y Cao, J Li
CCF International Conference on Natural Language Processing and Chinese …, 2020
242020
Efficient and secure federated learning based on secret sharing and gradients selection
Y Dong, W Hou, X Chen, S Zeng
J. Comput. Res. Dev 57, 2241-2250, 2020
232020
Implementation and evaluation of different parallel designs of AES using CUDA
J Ma, X Chen, R Xu, J Shi
2017 IEEE second international conference on data science in cyberspace (DSC …, 2017
232017
Detecting insider threat based on document access behavior analysis
R Zhang, X Chen, J Shi, F Xu, Y Pu
Web Technologies and Applications: APWeb 2014 Workshops, SNA, NIS, and IoTS …, 2014
222014
A multi-level analysis framework in network security situation awareness
H Zhang, J Shi, X Chen
Procedia Computer Science 17, 530-536, 2013
222013
Efficient and private set intersection of human genomes
L Shen, X Chen, D Wang, B Fang, Y Dong
2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2018
212018
Meteor: improved secure 3-party neural network inference with reducing online communication costs
Y Dong, C Xiaojun, W Jing, L Kaiyun, W Wang
Proceedings of the ACM Web Conference 2023, 2087-2098, 2023
162023
An efficient 3-party framework for privacy-preserving neural network inference
L Shen, X Chen, J Shi, Y Dong, B Fang
European Symposium on Research in Computer Security, 419-439, 2020
152020
CLTS+: A new Chinese long text summarization dataset with abstractive summaries
X Liu, S Zang, C Zhang, X Chen, Y Ding
International Conference on Artificial Neural Networks, 73-84, 2022
132022
A multiple watermarking algorithm for texts mixed Chinese and English
X Rui, C XiaoJun, S Jinqiao
Procedia Computer Science 17, 844-851, 2013
132013
Improving abstractive text summarization with history aggregation
P Liao, C Zhang, X Chen, X Zhou
2020 International Joint Conference on Neural Networks (IJCNN), 1-9, 2020
122020
سیستم در حال حاضر قادر به انجام عملکرد نیست. بعداً دوباره امتحان کنید.
مقاله‌ها 1–20