Eastfly: Efficient and secure ternary federated learning Y Dong, X Chen, L Shen, D Wang Computers & Security 94, 101824, 2020 | 106 | 2020 |
Defeat: Deep hidden feature backdoor attacks by imperceptible perturbation and latent representation constraints Z Zhao, X Chen, Y Xuan, Y Dong, D Wang, K Liang Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022 | 92 | 2022 |
A survey on collaborative deep learning and privacy-preserving D Zhang, X Chen, D Wang, J Shi 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC …, 2018 | 88 | 2018 |
A bigram based real time DNS tunnel detection approach C Qi, X Chen, C Xu, J Shi, P Liu Procedia Computer Science 17, 852-860, 2013 | 84 | 2013 |
: Oblivious Defender for Private Byzantine-Robust Federated Learning with Dishonest-Majority Y Dong, X Chen, K Li, D Wang, S Zeng European Symposium on Research in Computer Security, 497-518, 2021 | 65 | 2021 |
Inferring attack intent of malicious insider based on probabilistic attack graph model XJ Chen, BX Fang, QF Tan, H Zhang Chinese Journal of Computers 37 (1), 62-72, 2014 | 43 | 2014 |
Privacy-preserving distributed machine learning based on secret sharing Y Dong, X Chen, L Shen, D Wang Information and Communications Security: 21st International Conference …, 2020 | 29 | 2020 |
Abstractive text summarization with multi-head attention J Li, C Zhang, X Chen, Y Cao, P Liao, P Zhang 2019 international joint conference on neural networks (ijcnn), 1-8, 2019 | 25 | 2019 |
Survey on automatic text summarization J Li, C Zhang, X Chen, Y Hu, P Liao Journal of computer research and development 58 (01), 1-21, 2021 | 24 | 2021 |
CLTS: a new Chinese long text summarization dataset X Liu, C Zhang, X Chen, Y Cao, J Li CCF International Conference on Natural Language Processing and Chinese …, 2020 | 24 | 2020 |
Efficient and secure federated learning based on secret sharing and gradients selection Y Dong, W Hou, X Chen, S Zeng J. Comput. Res. Dev 57, 2241-2250, 2020 | 23 | 2020 |
Implementation and evaluation of different parallel designs of AES using CUDA J Ma, X Chen, R Xu, J Shi 2017 IEEE second international conference on data science in cyberspace (DSC …, 2017 | 23 | 2017 |
Detecting insider threat based on document access behavior analysis R Zhang, X Chen, J Shi, F Xu, Y Pu Web Technologies and Applications: APWeb 2014 Workshops, SNA, NIS, and IoTS …, 2014 | 22 | 2014 |
A multi-level analysis framework in network security situation awareness H Zhang, J Shi, X Chen Procedia Computer Science 17, 530-536, 2013 | 22 | 2013 |
Efficient and private set intersection of human genomes L Shen, X Chen, D Wang, B Fang, Y Dong 2018 IEEE International Conference on Bioinformatics and Biomedicine (BIBM …, 2018 | 21 | 2018 |
Meteor: improved secure 3-party neural network inference with reducing online communication costs Y Dong, C Xiaojun, W Jing, L Kaiyun, W Wang Proceedings of the ACM Web Conference 2023, 2087-2098, 2023 | 16 | 2023 |
An efficient 3-party framework for privacy-preserving neural network inference L Shen, X Chen, J Shi, Y Dong, B Fang European Symposium on Research in Computer Security, 419-439, 2020 | 15 | 2020 |
CLTS+: A new Chinese long text summarization dataset with abstractive summaries X Liu, S Zang, C Zhang, X Chen, Y Ding International Conference on Artificial Neural Networks, 73-84, 2022 | 13 | 2022 |
A multiple watermarking algorithm for texts mixed Chinese and English X Rui, C XiaoJun, S Jinqiao Procedia Computer Science 17, 844-851, 2013 | 13 | 2013 |
Improving abstractive text summarization with history aggregation P Liao, C Zhang, X Chen, X Zhou 2020 International Joint Conference on Neural Networks (IJCNN), 1-9, 2020 | 12 | 2020 |