Adversarial attacks and defenses in deep learning K Ren, T Zheng, Z Qin, X Liu Engineering 6 (3), 346-360, 2020 | 664 | 2020 |
Pointcloud saliency maps T Zheng, C Chen, J Yuan, B Li, K Ren Proceedings of the IEEE/CVF international conference on computer vision …, 2019 | 240 | 2019 |
Distributionally adversarial attack T Zheng, C Chen, K Ren Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 2253-2260, 2019 | 158 | 2019 |
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren NDSS 2020, 1-18, 2020 | 123 | 2020 |
Data poisoning attack against knowledge graph embedding H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren arXiv preprint arXiv:1904.12052, 2019 | 105 | 2019 |
Can we use arbitrary objects to attack lidar perception in autonomous driving? Y Zhu, C Miao, T Zheng, F Hajiaghajani, L Su, C Qiao Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 75 | 2021 |
FID: Function modeling-based data-independent and channel-robust physical-layer identification T Zheng, Z Sun, K Ren IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 199-207, 2019 | 52 | 2019 |
Poisoning attacks on deep learning based wireless traffic prediction T Zheng, B Li IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 660-669, 2022 | 27 | 2022 |
Towards understanding the adversarial vulnerability of skeleton-based action recognition T Zheng, S Liu, C Chen, J Yuan, B Li, K Ren arXiv preprint arXiv:2005.07151, 2020 | 24 | 2020 |
Principal curvatures and area ratio of propagating surfaces in isotropic turbulence T Zheng, J You, Y Yang Physical Review Fluids 2 (10), 103201, 2017 | 19 | 2017 |
Fair text-to-image diffusion via fair mapping J Li, L Hu, J Zhang, T Zheng, H Zhang, D Wang arXiv preprint arXiv:2311.17695, 2023 | 15 | 2023 |
Guided erasable adversarial attack (GEAA) toward shared data protection M Zhao, B Wang, W Wang, Y Kong, T Zheng, K Ren IEEE Transactions on Information Forensics and Security 17, 2468-2482, 2022 | 13 | 2022 |
Towards data poisoning attack against knowledge graph embedding H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren arXiv preprint arXiv:1904.12052, 2019 | 11 | 2019 |
On the robustness of metric learning: an adversarial perspective M Huai, T Zheng, C Miao, L Yao, A Zhang ACM Transactions on Knowledge Discovery from Data (TKDD) 16 (5), 1-25, 2022 | 10 | 2022 |
First-order efficient general-purpose clean-label data poisoning T Zheng, B Li IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021 | 10 | 2021 |
Adversarial attacks and defenses in deep learning. Engineering 6, 3 (2020), 346–360 K Ren, T Zheng, Z Qin, X Liu | 9 | 2020 |
Learning saliency maps for adversarial point-cloud generation T Zheng, C Chen, K Ren arXiv preprint arXiv:1812.01687, 2018 | 9 | 2018 |
Fltracer: Accurate poisoning attack provenance in federated learning X Zhang, Q Liu, Z Ba, Y Hong, T Zheng, F Lin, L Lu, K Ren IEEE Transactions on Information Forensics and Security, 2024 | 7 | 2024 |
Text Guided Image Editing with Automatic Concept Locating and Forgetting J Li, L Hu, Z He, J Zhang, T Zheng, D Wang arXiv preprint arXiv:2405.19708, 2024 | 7 | 2024 |
Is pgd-adversarial training necessary? Alternative training via a soft-quantization network with noisy-natural samples only T Zheng, C Chen, K Ren | 7 | 2018 |