A backdoor attack against lstm-based text classification systems J Dai, C Chen, Y Li IEEE Access 7, 138872-138878, 2019 | 372 | 2019 |
Mitigating backdoor attacks in lstm-based text classification systems by backdoor keyword identification C Chen, J Dai Neurocomputing 452, 253-262, 2021 | 128 | 2021 |
Designated-receiver proxy signature scheme for electronic commerce JZ Dai, XH Yang, JX Dong SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003 | 109 | 2003 |
A PKI-based mechanism for secure and efficient access to outsourced data J Dai, Q Zhou 2010 International Conference on Networking and Digital Society 1, 640-643, 2010 | 46 | 2010 |
Fast-uap: An algorithm for expediting universal adversarial perturbation generation using the orientations of perturbation vectors J Dai, L Shu Neurocomputing 422, 109-117, 2021 | 19 | 2021 |
A targeted universal attack on graph convolutional network by using fake nodes J Dai, W Zhu, X Luo Neural Processing Letters 54 (4), 3321-3337, 2022 | 18 | 2022 |
A method for the trajectory privacy protection based on the segmented fake trajectory under road networks J Dai, L Hua 2015 2nd International Conference on Information Science and Control …, 2015 | 15 | 2015 |
TwinNet: A double sub-network framework for detecting universal adversarial perturbations Y Ruan, J Dai Future Internet 10 (3), 26, 2018 | 14 | 2018 |
D_DIPS: An intrusion prevention system for database security J Dai, H Miao Information and Communications Security: 7th International Conference, ICICS …, 2005 | 11 | 2005 |
A targeted universal attack on graph convolutional network J Dai, W Zhu, X Luo arXiv preprint arXiv:2011.14365, 2020 | 9 | 2020 |
A semantic backdoor attack against graph convolutional networks J Dai, Z Xiong, C Cao Neurocomputing 600, 128133, 2024 | 8 | 2024 |
A privacy preserving framework for worker’s location in spatial crowdsourcing based on local differential privacy J Dai, K Qiao Future Internet 10 (6), 53, 2018 | 7 | 2018 |
An optimized privacy inference attack based on smartwatch motion sensors J Dai, Y Duan, F Yang 2016 IEEE International Conference on Internet of Things (iThings) and IEEE …, 2016 | 7 | 2016 |
A location authentication scheme based on adjacent users L Hua, J Dai 2014 IEEE International Conference on Progress in Informatics and Computing …, 2014 | 6 | 2014 |
A privacy-preserving access control in outsourced storage services D Jiazhu, L Shuangyan, L Hongxia 2011 IEEE International Conference on Computer Science and Automation …, 2011 | 6 | 2011 |
A location authentication scheme based on proximity test of location tags D Jiazhu, L Zhilong IET Digital Library, 2013 | 4 | 2013 |
A completeness and freshness guarantee scheme for outsourced database D Jiazhu, Z Yurong, L Xin, L Shuangyan 2011 Second International Conference on Networking and Distributed Computing …, 2011 | 4 | 2011 |
A privacy-protecting proxy signature scheme and its application JZ Dai, XH Yang, JX Dong Proceedings of the 42nd annual Southeast regional conference, 203-206, 2004 | 4 | 2004 |
PLocShare: a privacy-preserving location sharing scheme in mobile social network J Dai, L Hua 2014 IEEE workshop on electronics, computer and applications, 149-152, 2014 | 3 | 2014 |
Designated-receiver proxy signature scheme JZ Dai, XH Yang, JX Dong Zhejiang Daxue Xuebao(Gongxue Ban)/Journal of Zhejiang University …, 2004 | 3 | 2004 |