default search action
Shengshan Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Jianrong Lu, Shengshan Hu, Wei Wan, Minghui Li, Leo Yu Zhang, Lulu Xue, Hai Jin:
Depriving the Survival Space of Adversaries Against Poisoned Gradients in Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 5405-5418 (2024) - [j13]Man Zhou, Yuting Zhou, Shuao Su, Qian Wang, Qi Li, Shengshan Hu, Chunwu Yu, Zhengxiong Li:
FingerPattern: Securing Pattern Lock via Fingerprint-Dependent Friction Sound. IEEE Trans. Mob. Comput. 23(6): 7210-7224 (2024) - [c40]Lulu Xue, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun, Dezhong Yao:
Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks. AAAI 2024: 6404-6412 - [c39]Di Mi, Yanjun Zhang, Leo Yu Zhang, Shengshan Hu, Qi Zhong, Haizhuan Yuan, Shirui Pan:
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation. AAAI 2024: 19902-19910 - [c38]Xianlong Wang, Minghui Li, Peng Xu, Wei Liu, Leo Yu Zhang, Shengshan Hu, Yanjun Zhang:
PointAPA: Towards Availability Poisoning Attacks in 3D Point Clouds. ESORICS (1) 2024: 125-145 - [c37]Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin:
ECLIPSE: Expunging Clean-Label Indiscriminate Poisons via Sparse Diffusion Purification. ESORICS (1) 2024: 146-166 - [c36]Longling Zhang, Lyqi Liu, Dan Meng, Jun Wang, Shengshan Hu:
Stealthy Backdoor Attack Towards Federated Automatic Speaker Verification. ICASSP 2024: 1311-1315 - [c35]Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin:
MISA: Unveiling the Vulnerabilities in Split Federated Learning. ICASSP 2024: 6435-6439 - [c34]Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen:
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness in the Physical World. IJCAI 2024: 1670-1678 - [c33]Minghui Li, Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Leo Yu Zhang, Yichen Wang:
DarkFed: A Data-Free Backdoor Attack in Federated Learning. IJCAI 2024: 4443-4451 - [c32]Minghui Li, Jiangxiong Wang, Hao Zhang, Ziqi Zhou, Shengshan Hu, Xiaobing Pei:
Transferable Adversarial Facial Images for Privacy Protection. ACM Multimedia 2024: 10649-10658 - [c31]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. SP 2024: 2048-2066 - [c30]Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples. SP 2024: 3015-3033 - [c29]Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin:
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability. SP 2024: 3365-3384 - [i38]Lulu Xue, Shengshan Hu, Ruizhi Zhao, Leo Yu Zhang, Shengqing Hu, Lichao Sun, Dezhong Yao:
Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks. CoRR abs/2401.16687 (2024) - [i37]Di Mi, Yanjun Zhang, Leo Yu Zhang, Shengshan Hu, Qi Zhong, Haizhuan Yuan, Shirui Pan:
Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation. CoRR abs/2403.07673 (2024) - [i36]Ziqi Zhou, Minghui Li, Wei Liu, Shengshan Hu, Yechao Zhang, Wei Wan, Lulu Xue, Leo Yu Zhang, Dezhong Yao, Hai Jin:
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples. CoRR abs/2403.10801 (2024) - [i35]Hangtao Zhang, Shengshan Hu, Yichen Wang, Leo Yu Zhang, Ziqi Zhou, Xianlong Wang, Yanjun Zhang, Chao Chen:
Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness. CoRR abs/2404.11357 (2024) - [i34]Minghui Li, Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Leo Yu Zhang, Yichen Wang:
DarkFed: A Data-Free Backdoor Attack in Federated Learning. CoRR abs/2405.03299 (2024) - [i33]Dezhong Yao, Sanmu Li, Yutong Dai, Zhiqiang Xu, Shengshan Hu, Peilin Zhao, Lichao Sun:
Variational Bayes for Federated Continual Learning. CoRR abs/2405.14291 (2024) - [i32]Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, Leo Yu Zhang, Chao Chen, Shengshan Hu, Asif Gill, Shirui Pan:
Large Language Model Watermark Stealing With Mixed Integer Programming. CoRR abs/2405.19677 (2024) - [i31]Xianlong Wang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Leo Yu Zhang, Peng Xu, Wei Wan, Hai Jin:
ECLIPSE: Expunging Clean-label Indiscriminate Poisons via Sparse Diffusion Purification. CoRR abs/2406.15093 (2024) - [i30]Hangtao Zhang, Chenyu Zhu, Xianlong Wang, Ziqi Zhou, Shengshan Hu, Leo Yu Zhang:
BadRobot: Jailbreaking LLM-based Embodied AI in the Physical World. CoRR abs/2407.20242 (2024) - [i29]Minghui Li, Jiangxiong Wang, Hao Zhang, Ziqi Zhou, Shengshan Hu, Xiaobing Pei:
Transferable Adversarial Facial Images for Privacy Protection. CoRR abs/2408.01428 (2024) - [i28]Xianlong Wang, Minghui Li, Wei Liu, Hangtao Zhang, Shengshan Hu, Yechao Zhang, Ziqi Zhou, Hai Jin:
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need. CoRR abs/2410.03644 (2024) - 2023
- [c28]Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun:
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples. AAAI 2023: 872-880 - [c27]Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang:
Masked Language Model Based Textual Adversarial Example Detection. AsiaCCS 2023: 925-937 - [c26]Xiaogeng Liu, Minghui Li, Haoyu Wang, Shengshan Hu, Dengpan Ye, Hai Jin, Libing Wu, Chaowei Xiao:
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency. CVPR 2023: 16363-16372 - [c25]Qiufan Ji, Lin Wang, Cong Shi, Shengshan Hu, Yingying Chen, Lichao Sun:
Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples. ICCV 2023: 4272-4281 - [c24]Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin:
Downstream-agnostic Adversarial Examples. ICCV 2023: 4322-4332 - [c23]Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Wee-Chung Liew, Zhetao Li:
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning. IJCAI 2023: 4567-4575 - [c22]Jingyang Li, Dengpan Ye, Long Tang, Chuanxi Chen, Shengshan Hu:
Voice Guard: Protecting Voice Privacy with Strong and Imperceptible Adversarial Perturbation in the Time Domain. IJCAI 2023: 4812-4820 - [c21]Shengshan Hu, Wei Liu, Minghui Li, Yechao Zhang, Xiaogeng Liu, Xianlong Wang, Leo Yu Zhang, Junhui Hou:
PointCRT: Detecting Backdoor in 3D Point Cloud via Corruption Robustness. ACM Multimedia 2023: 666-675 - [c20]Ziqi Zhou, Shengshan Hu, Minghui Li, Hangtao Zhang, Yechao Zhang, Hai Jin:
AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning. ACM Multimedia 2023: 6311-6320 - [c19]Wei Wan, Shengshan Hu, Minghui Li, Jianrong Lu, Longling Zhang, Leo Yu Zhang, Hai Jin:
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning. ACM Multimedia 2023: 7394-7402 - [i27]Long Tang, Dengpan Ye, Zhenhao Lu, Yunming Zhang, Shengshan Hu, Yue Xu, Chuanxi Chen:
Feature Extraction Matters More: Universal Deepfake Disruption through Attacking Ensemble Feature Extractors. CoRR abs/2303.00200 (2023) - [i26]Xiaogeng Liu, Minghui Li, Haoyu Wang, Shengshan Hu, Dengpan Ye, Hai Jin, Libing Wu, Chaowei Xiao:
Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency. CoRR abs/2303.18191 (2023) - [i25]Xiaomei Zhang, Zhaoxi Zhang, Qi Zhong, Xufei Zheng, Yanjun Zhang, Shengshan Hu, Leo Yu Zhang:
Masked Language Model Based Textual Adversarial Example Detection. CoRR abs/2304.08767 (2023) - [i24]Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Wee-Chung Liew, Zhetao Li:
Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning. CoRR abs/2304.10783 (2023) - [i23]Yechao Zhang, Shengshan Hu, Leo Yu Zhang, Junyu Shi, Minghui Li, Xiaogeng Liu, Wei Wan, Hai Jin:
Why Does Little Robustness Help? Understanding Adversarial Transferability From Surrogate Training. CoRR abs/2307.07873 (2023) - [i22]Ziqi Zhou, Shengshan Hu, Ruizhi Zhao, Qian Wang, Leo Yu Zhang, Junhui Hou, Hai Jin:
Downstream-agnostic Adversarial Examples. CoRR abs/2307.12280 (2023) - [i21]Qiufan Ji, Lin Wang, Cong Shi, Shengshan Hu, Yingying Chen, Lichao Sun:
Benchmarking and Analyzing Robust Point Cloud Recognition: Bag of Tricks for Defending Adversarial Examples. CoRR abs/2307.16361 (2023) - [i20]Wei Wan, Shengshan Hu, Minghui Li, Jianrong Lu, Longling Zhang, Leo Yu Zhang, Hai Jin:
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning. CoRR abs/2308.03331 (2023) - [i19]Ziqi Zhou, Shengshan Hu, Minghui Li, Hangtao Zhang, Yechao Zhang, Hai Jin:
AdvCLIP: Downstream-agnostic Adversarial Examples in Multimodal Contrastive Learning. CoRR abs/2308.07026 (2023) - [i18]Xianlong Wang, Shengshan Hu, Minghui Li, Zhifei Yu, Ziqi Zhou, Leo Yu Zhang, Hai Jin:
Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations. CoRR abs/2311.18403 (2023) - [i17]Xiaoxing Mo, Yechao Zhang, Leo Yu Zhang, Wei Luo, Nan Sun, Shengshan Hu, Shang Gao, Yang Xiang:
Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics. CoRR abs/2312.02673 (2023) - [i16]Wei Wan, Yuxuan Ning, Shengshan Hu, Lulu Xue, Minghui Li, Leo Yu Zhang, Hai Jin:
MISA: Unveiling the Vulnerabilities in Split Federated Learning. CoRR abs/2312.11026 (2023) - 2022
- [j12]Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Bilal Hussain Abbasi, Shengshan Hu:
Evaluating Membership Inference Through Adversarial Robustness. Comput. J. 65(11): 2969-2978 (2022) - [j11]Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. IEEE Trans. Dependable Secur. Comput. 19(3): 1592-1604 (2022) - [c18]Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu:
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer. CVPR 2022: 14994-15003 - [c17]Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang:
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. ICME 2022: 1-6 - [c16]Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang, Hai Jin, Yuanyuan He:
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection. IJCAI 2022: 753-760 - [c15]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. ISCC 2022: 1-6 - [c14]Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, Hai Jin:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label. ACM Multimedia 2022: 678-686 - [c13]Minghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng:
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints. MSN 2022: 178-185 - [c12]Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang:
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning. TrustCom 2022: 139-146 - [i15]Shengshan Hu, Xiaogeng Liu, Yechao Zhang, Minghui Li, Leo Yu Zhang, Hai Jin, Libing Wu:
Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer. CoRR abs/2203.03121 (2022) - [i14]Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu:
Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation. CoRR abs/2203.03810 (2022) - [i13]Qi Zhong, Leo Yu Zhang, Shengshan Hu, Longxiang Gao, Jun Zhang, Yong Xiang:
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. CoRR abs/2204.01934 (2022) - [i12]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. CoRR abs/2204.10958 (2022) - [i11]Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang, Hai Jin, Yuanyuan He:
Shielding Federated Learning: Robust Aggregation with Adaptive Client Selection. CoRR abs/2204.13256 (2022) - [i10]Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Bilal Hussain Abbasi, Shengshan Hu:
Evaluating Membership Inference Through Adversarial Robustness. CoRR abs/2205.06986 (2022) - [i9]Shengshan Hu, Ziqi Zhou, Yechao Zhang, Leo Yu Zhang, Yifeng Zheng, Yuanyuan He, Hai Jin:
BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label. CoRR abs/2207.00278 (2022) - [i8]Minghui Li, Wei Wan, Jianrong Lu, Shengshan Hu, Junyu Shi, Leo Yu Zhang, Man Zhou, Yifeng Zheng:
Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints. CoRR abs/2210.01437 (2022) - [i7]Shengshan Hu, Junwei Zhang, Wei Liu, Junhui Hou, Minghui Li, Leo Yu Zhang, Hai Jin, Lichao Sun:
PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models Against Adversarial Examples. CoRR abs/2211.12294 (2022) - 2021
- [j10]Shengshan Hu, Leo Yu Zhang, Qian Wang, Zhan Qin, Cong Wang:
Towards Private and Scalable Cross-Media Retrieval. IEEE Trans. Dependable Secur. Comput. 18(3): 1354-1368 (2021) - [j9]Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo, Pengfei Hu:
Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2029-2041 (2021) - [j8]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Zhibo Wang, Dengpan Ye:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. IEEE Trans. Dependable Secur. Comput. 18(6): 2569-2581 (2021) - [j7]Dian Chen, Haobo Yuan, Shengshan Hu, Qian Wang, Cong Wang:
BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication. IEEE Trans. Parallel Distributed Syst. 32(4): 786-798 (2021) - [c11]Chaoxiang He, Bin Benjamin Zhu, Xiaojing Ma, Hai Jin, Shengshan Hu:
Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense. CCS 2021: 3159-3176 - [c10]Shengshan Hu, Yechao Zhang, Xiaogeng Liu, Leo Yu Zhang, Minghui Li, Hai Jin:
AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch. ACM Multimedia 2021: 2335-2343 - [c9]Wei Wan, Jianrong Lu, Shengshan Hu, Leo Yu Zhang, Xiaobing Pei:
Shielding Federated Learning: A New Attack Approach and Its Defense. WCNC 2021: 1-7 - [i6]Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Shengshan Hu, Jinyu Tian, Jiantao Zhou:
Self-Supervised Adversarial Example Detection by Disentangled Representation. CoRR abs/2105.03689 (2021) - [i5]Shengshan Hu, Jianrong Lu, Wei Wan, Leo Yu Zhang:
Challenges and approaches for mitigating byzantine attacks in federated learning. CoRR abs/2112.14468 (2021) - 2020
- [i4]Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Minxin Du, Zhibo Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. CoRR abs/2002.10944 (2020)
2010 – 2019
- 2019
- [j6]Shengshan Hu, Xingcan Shang, Zhan Qin, Minghui Li, Qian Wang, Cong Wang:
Adversarial Examples for Automatic Speech Recognition: Attacks and Countermeasures. IEEE Commun. Mag. 57(10): 120-126 (2019) - [j5]Man Zhou, Zhan Qin, Xiu Lin, Shengshan Hu, Qian Wang, Kui Ren:
Hidden Voice Commands: Attacks and Defenses on the VCS of Autonomous Driving Cars. IEEE Wirel. Commun. 26(5): 128-133 (2019) - [i3]Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du:
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service. CoRR abs/1909.06961 (2019) - [i2]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Minghui Li, Zhibo Wang, Dengpan Ye:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. CoRR abs/1909.09472 (2019) - [i1]Lingchen Zhao, Shengshan Hu, Qian Wang, Jianlin Jiang, Chao Shen, Xiangyang Luo:
Shielding Collaborative Learning: Mitigating Poisoning Attacks through Client-Side Detection. CoRR abs/1910.13111 (2019) - 2018
- [j4]Shengshan Hu, Minghui Li, Qian Wang, Sherman S. M. Chow, Minxin Du:
Outsourced Biometric Identification With Privacy. IEEE Trans. Inf. Forensics Secur. 13(10): 2448-2463 (2018) - [c8]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Xiangyang Luo, Kui Ren:
Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization. INFOCOM 2018: 792-800 - [c7]Lingchen Zhao, Lihao Ni, Shengshan Hu, Yanjiao Chen, Pan Zhou, Fu Xiao, Libing Wu:
InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy. INFOCOM 2018: 2087-2095 - 2017
- [j3]Jingjun Wang, Shengshan Hu, Qian Wang, Yutao Ma:
Privacy-Preserving Outsourced Feature Extractions in the Cloud: A Survey. IEEE Netw. 31(5): 36-41 (2017) - [c6]Qian Wang, Shengshan Hu, Minxin Du, Jingjun Wang, Kui Ren:
Learning privately: Privacy-preserving canonical correlation analysis for cross-media retrieval. INFOCOM 2017: 1-9 - 2016
- [j2]Shengshan Hu, Qian Wang, Jingjun Wang, Zhan Qin, Kui Ren:
Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data. IEEE Trans. Image Process. 25(7): 3411-3425 (2016) - [j1]Qian Wang, Kui Ren, Peng Ning, Shengshan Hu:
Jamming-Resistant Multiradio Multichannel Opportunistic Spectrum Access in Cognitive Radio Networks. IEEE Trans. Veh. Technol. 65(10): 8331-8344 (2016) - [c5]Qian Wang, Jingjun Wang, Shengshan Hu, Qin Zou, Kui Ren:
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud. AsiaCCS 2016: 257-268 - [c4]Qian Wang, Shengshan Hu, Jingjun Wang, Kui Ren:
Secure Surfing: Privacy-Preserving Speeded-Up Robust Feature Extractor. ICDCS 2016: 700-710 - [c3]Qian Wang, Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, Minxin Du:
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data. INFOCOM 2016: 1-9 - [c2]Shengshan Hu, Qian Wang, Jingjun Wang, Sherman S. M. Chow, Qin Zou:
Securing Fast Learning! Ridge Regression over Encrypted Big Data. Trustcom/BigDataSE/ISPA 2016: 19-26 - 2015
- [c1]Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang:
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. ESORICS (2) 2015: 186-205
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint