Search

Your search keyword '"Cheng, Guang"' showing total 5,496 results

Search Constraints

Start Over You searched for: Author "Cheng, Guang" Remove constraint Author: "Cheng, Guang"
5,496 results on '"Cheng, Guang"'

Search Results

1. Watermarking Generative Categorical Data

2. DEREC-SIMPRO: unlock Language Model benefits to advance Synthesis in Data Clean Room

3. Data Deletion for Linear Regression with Noisy SGD

4. TimeAutoDiff: Combining Autoencoder and Diffusion model for time series tabular data synthesizing

5. Advancing Retail Data Science: Comprehensive Evaluation of Synthetic Data

6. Data Plagiarism Index: Characterizing the Privacy Risk of Data-Copying in Tabular Generative Models

7. CTSyn: A Foundational Model for Cross Tabular Data Generation

8. Dynamic Online Recommendation for Two-Sided Market with Bayesian Incentive Compatibility

9. Transfer Learning for Diffusion Models

10. Latent Energy-Based Odyssey: Black-Box Optimization via Expanded Exploration in the Energy-Based Latent Space

11. BadGD: A unified data-centric framework to identify gradient descent vulnerabilities

12. Discriminative Estimation of Total Variation Distance: A Fidelity Auditor for Generative Data

13. Watermarking Generative Tabular Data

14. Tree-based Ensemble Learning for Out-of-distribution Detection

15. Inferring State Machine from the Protocol Implementation via Large Language Model

16. TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-training

17. A Stable Fine-Grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network

18. Minimax Optimal Fair Classification with Bounded Demographic Disparity

19. Approximation of RKHS Functionals by Neural Networks

20. FairRR: Pre-Processing for Group Fairness through Randomized Response

21. Rate-Optimal Rank Aggregation with Private Pairwise Rankings

22. DeMarking: A Defense for Network Flow Watermarking in Real-Time

23. Bayes-Optimal Fair Classification with Linear Disparity Constraints via Pre-, In-, and Post-processing

24. Theoretical Understanding of In-Context Learning in Shallow Transformers with Unstructured Data

25. Better Representations via Adversarial Training in Pre-Training: A Theoretical Perspective

26. A Survey on Statistical Theory of Deep Learning: Approximation, Training Dynamics, and Generative Models

27. Downstream Task-Oriented Generative Model Selections on Synthetic Data Training for Fraud Detection Models

28. Improve Fidelity and Utility of Synthetic Credit Card Transaction Time Series from Data-centric Perspective

29. MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks

34. Clinical characteristics of primary vesicoureteral reflux in children with an allergic constitution

35. AutoDiff: combining Auto-encoder and Diffusion model for tabular data synthesizing

36. Improve Deep Forest with Learnable Layerwise Augmentation Policy Schedule

37. Risk factors for renal outcomes in children with antineutrophil cytoplasmic antibody-associated vasculitis: a nationwide retrospective study in China

38. MissDiff: Training Diffusion Models on Tabular Data with Missing Values

39. Utility Theory of Synthetic Data Generation

40. Tight Non-asymptotic Inference via Sub-Gaussian Intrinsic Moment Norm

41. Two-sided Competing Matching Recommendation Markets With Quota and Complementary Preferences Constraints

42. Statistical Theory of Differentially Private Marginal-based Data Synthesis Algorithms

43. Ranking Differential Privacy

44. Sub-structure characteristic mode analysis of microstrip antennas using a global multi-trace formulation

45. On the Utility Recovery Incapability of Neural Net-based Differential Private Tabular Training Data Synthesizer under Privacy Deregulation

46. Improving Adversarial Robustness by Contrastive Guided Diffusion Process

47. Differentially Private Bootstrap: New Privacy Analysis and Inference Strategies

48. Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features

49. Unveiling the Unseen: Video Recognition Attacks on Social Software

Catalog

Books, media, physical & digital resources