20 results on '"Haixu Tang"'
Search Results
2. ByzSFL: Achieving Byzantine-Robust Secure Federated Learning with Zero-Knowledge Proofs.
3. LLM-Enhanced Software Patch Localization.
4. DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training.
5. Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering.
6. Large Language Model Soft Ideologization via AI-Self-Consciousness.
7. The Janus Interface: How Fine-Tuning in Large Language Models Amplifies the Privacy Risks.
8. Understanding Impacts of Task Similarity on Backdoor Attack and Detection.
9. Selective Amnesia: On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned Machine Learning Models.
10. HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework.
11. Understanding TEE Containers, Easy to Use? Hard to Trust.
12. Towards Fair Cross-Domain Adaptation via Generative Learning.
13. Bounding The Number of Linear Regions in Local Area for Neural Networks with ReLU Activations.
14. Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance.
15. Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
16. Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection.
17. Understanding Membership Inferences on Well-Generalized Learning Models.
18. Smooth q-Gram, and Its Applications to Detection of Overlaps among Long, Error-Prone Sequencing Reads.
19. Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
20. Utilizing de Bruijn graph of metagenome assembly for metatranscriptome analysis.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.