Segui
Tianhang Zheng
Tianhang Zheng
Email verificata su zju.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Adversarial attacks and defenses in deep learning
K Ren, T Zheng, Z Qin, X Liu
Engineering 6 (3), 346-360, 2020
6642020
Pointcloud saliency maps
T Zheng, C Chen, J Yuan, B Li, K Ren
Proceedings of the IEEE/CVF international conference on computer vision …, 2019
2402019
Distributionally adversarial attack
T Zheng, C Chen, K Ren
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 2253-2260, 2019
1582019
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren
NDSS 2020, 1-18, 2020
1232020
Data poisoning attack against knowledge graph embedding
H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren
arXiv preprint arXiv:1904.12052, 2019
1052019
Can we use arbitrary objects to attack lidar perception in autonomous driving?
Y Zhu, C Miao, T Zheng, F Hajiaghajani, L Su, C Qiao
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
752021
FID: Function modeling-based data-independent and channel-robust physical-layer identification
T Zheng, Z Sun, K Ren
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 199-207, 2019
522019
Poisoning attacks on deep learning based wireless traffic prediction
T Zheng, B Li
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 660-669, 2022
272022
Towards understanding the adversarial vulnerability of skeleton-based action recognition
T Zheng, S Liu, C Chen, J Yuan, B Li, K Ren
arXiv preprint arXiv:2005.07151, 2020
242020
Principal curvatures and area ratio of propagating surfaces in isotropic turbulence
T Zheng, J You, Y Yang
Physical Review Fluids 2 (10), 103201, 2017
192017
Fair text-to-image diffusion via fair mapping
J Li, L Hu, J Zhang, T Zheng, H Zhang, D Wang
arXiv preprint arXiv:2311.17695, 2023
152023
Guided erasable adversarial attack (GEAA) toward shared data protection
M Zhao, B Wang, W Wang, Y Kong, T Zheng, K Ren
IEEE Transactions on Information Forensics and Security 17, 2468-2482, 2022
132022
Towards data poisoning attack against knowledge graph embedding
H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren
arXiv preprint arXiv:1904.12052, 2019
112019
On the robustness of metric learning: an adversarial perspective
M Huai, T Zheng, C Miao, L Yao, A Zhang
ACM Transactions on Knowledge Discovery from Data (TKDD) 16 (5), 1-25, 2022
102022
First-order efficient general-purpose clean-label data poisoning
T Zheng, B Li
IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021
102021
Adversarial attacks and defenses in deep learning. Engineering 6, 3 (2020), 346–360
K Ren, T Zheng, Z Qin, X Liu
92020
Learning saliency maps for adversarial point-cloud generation
T Zheng, C Chen, K Ren
arXiv preprint arXiv:1812.01687, 2018
92018
Fltracer: Accurate poisoning attack provenance in federated learning
X Zhang, Q Liu, Z Ba, Y Hong, T Zheng, F Lin, L Lu, K Ren
IEEE Transactions on Information Forensics and Security, 2024
72024
Text Guided Image Editing with Automatic Concept Locating and Forgetting
J Li, L Hu, Z He, J Zhang, T Zheng, D Wang
arXiv preprint arXiv:2405.19708, 2024
72024
Is pgd-adversarial training necessary? Alternative training via a soft-quantization network with noisy-natural samples only
T Zheng, C Chen, K Ren
72018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20