A comprehensive review on deep learning algorithms: Security and privacy issues

M Tayyab, M Marjani, NZ Jhanjhi, IAT Hashem… - Computers & …, 2023‏ - Elsevier
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …

Hierarchical graph transformer with adaptive node sampling

Z Zhang, Q Liu, Q Hu, CK Lee - Advances in Neural …, 2022‏ - proceedings.neurips.cc
The Transformer architecture has achieved remarkable success in a number of domains
including natural language processing and computer vision. However, when it comes to …

Molecule generation for target protein binding with structural motifs

Z Zhang, Y Min, S Zheng, Q Liu - The Eleventh International …, 2023‏ - openreview.net
Designing ligand molecules that bind to specific protein binding sites is a fundamental
problem in structure-based drug design. Although deep generative models and geometric …

Backdoor defense via deconfounded representation learning

Z Zhang, Q Liu, Z Wang, Z Lu… - Proceedings of the IEEE …, 2023‏ - openaccess.thecvf.com
Deep neural networks (DNNs) are recently shown to be vulnerable to backdoor attacks,
where attackers embed hidden backdoors in the DNN model by injecting a few poisoned …

Privacy leakage on dnns: A survey of model inversion attacks and defenses

H Fang, Y Qiu, H Yu, W Yu, J Kong, B Chong… - arxiv preprint arxiv …, 2024‏ - arxiv.org
Deep Neural Networks (DNNs) have revolutionized various domains with their exceptional
performance across numerous applications. However, Model Inversion (MI) attacks, which …

A survey of graph neural networks in real world: Imbalance, noise, privacy and ood challenges

W Ju, S Yi, Y Wang, Z **ao, Z Mao, H Li, Y Gu… - arxiv preprint arxiv …, 2024‏ - arxiv.org
Graph-structured data exhibits universality and widespread applicability across diverse
domains, such as social network analysis, biochemistry, financial fraud detection, and …

A survey on privacy in graph neural networks: Attacks, preservation, and applications

Y Zhang, Y Zhao, Z Li, X Cheng, Y Wang… - … on Knowledge and …, 2024‏ - ieeexplore.ieee.org
Graph Neural Networks (GNNs) have gained significant attention owing to their ability to
handle graph-structured data and the improvement in practical applications. However, many …

[HTML][HTML] Workplace security and privacy implications in the GenAI age: A survey

A Diro, S Kaisar, A Saini, S Fatima, PC Hiep… - Journal of Information …, 2025‏ - Elsevier
Abstract Generative Artificial Intelligence (GenAI) is transforming the workplace, but its
adoption introduces significant risks to data security and privacy. Recent incidents …

An equivariant generative framework for molecular graph-structure co-design

Z Zhang, Q Liu, CK Lee, CY Hsieh, E Chen - Chemical Science, 2023‏ - pubs.rsc.org
Designing molecules with desirable physiochemical properties and functionalities is a long-
standing challenge in chemistry, material science, and drug discovery. Recently, machine …

Mibench: A comprehensive benchmark for model inversion attack and defense

Y Qiu, H Yu, H Fang, W Yu, B Chen, X Wang… - arxiv preprint arxiv …, 2024‏ - arxiv.org
Model Inversion (MI) attacks aim at leveraging the output information of target models to
reconstruct privacy-sensitive training data, raising widespread concerns on privacy threats of …