关注
Jiazhu Dai(戴佳筑)
Jiazhu Dai(戴佳筑)
School of Computer Engineering and Science,Shanghai University
在 shu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A backdoor attack against lstm-based text classification systems
J Dai, C Chen, Y Li
IEEE Access 7, 138872-138878, 2019
3722019
Mitigating backdoor attacks in lstm-based text classification systems by backdoor keyword identification
C Chen, J Dai
Neurocomputing 452, 253-262, 2021
1282021
Designated-receiver proxy signature scheme for electronic commerce
JZ Dai, XH Yang, JX Dong
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003
1092003
A PKI-based mechanism for secure and efficient access to outsourced data
J Dai, Q Zhou
2010 International Conference on Networking and Digital Society 1, 640-643, 2010
462010
Fast-uap: An algorithm for expediting universal adversarial perturbation generation using the orientations of perturbation vectors
J Dai, L Shu
Neurocomputing 422, 109-117, 2021
192021
A targeted universal attack on graph convolutional network by using fake nodes
J Dai, W Zhu, X Luo
Neural Processing Letters 54 (4), 3321-3337, 2022
182022
A method for the trajectory privacy protection based on the segmented fake trajectory under road networks
J Dai, L Hua
2015 2nd International Conference on Information Science and Control …, 2015
152015
TwinNet: A double sub-network framework for detecting universal adversarial perturbations
Y Ruan, J Dai
Future Internet 10 (3), 26, 2018
142018
D_DIPS: An intrusion prevention system for database security
J Dai, H Miao
Information and Communications Security: 7th International Conference, ICICS …, 2005
112005
A targeted universal attack on graph convolutional network
J Dai, W Zhu, X Luo
arXiv preprint arXiv:2011.14365, 2020
92020
A semantic backdoor attack against graph convolutional networks
J Dai, Z Xiong, C Cao
Neurocomputing 600, 128133, 2024
82024
A privacy preserving framework for worker’s location in spatial crowdsourcing based on local differential privacy
J Dai, K Qiao
Future Internet 10 (6), 53, 2018
72018
An optimized privacy inference attack based on smartwatch motion sensors
J Dai, Y Duan, F Yang
2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016
72016
A location authentication scheme based on adjacent users
L Hua, J Dai
2014 IEEE International Conference on Progress in Informatics and Computing …, 2014
62014
A privacy-preserving access control in outsourced storage services
D Jiazhu, L Shuangyan, L Hongxia
2011 IEEE International Conference on Computer Science and Automation …, 2011
62011
A location authentication scheme based on proximity test of location tags
D Jiazhu, L Zhilong
IET Digital Library, 2013
42013
A completeness and freshness guarantee scheme for outsourced database
D Jiazhu, Z Yurong, L Xin, L Shuangyan
2011 Second International Conference on Networking and Distributed Computing …, 2011
42011
A privacy-protecting proxy signature scheme and its application
JZ Dai, XH Yang, JX Dong
Proceedings of the 42nd annual Southeast regional conference, 203-206, 2004
42004
PLocShare: a privacy-preserving location sharing scheme in mobile social network
J Dai, L Hua
2014 IEEE workshop on electronics, computer and applications, 149-152, 2014
32014
Designated-receiver proxy signature scheme
JZ Dai, XH Yang, JX Dong
Zhejiang Daxue Xuebao(Gongxue Ban)/Journal of Zhejiang University …, 2004
32004
系统目前无法执行此操作,请稍后再试。
文章 1–20