Search

Your search keyword '"Xu, Fengyuan"' showing total 194 results

Search Constraints

Start Over You searched for: Author "Xu, Fengyuan" Remove constraint Author: "Xu, Fengyuan"
194 results on '"Xu, Fengyuan"'

Search Results

1. Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?

2. CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation

4. Manipulating Transfer Learning for Property Inference

5. Automation Slicing and Testing for in-App Deep Learning Models

6. Quasi-linear analysis of dispersion relation preservation for nonlinear schemes

8. Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection

9. Stealthy Backdoors as Compression Artifacts

10. LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps

11. On developing piecewise rational mapping with fine regulation capability for WENO schemes

12. A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence

13. Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

14. Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem

17. A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security

18. AIQL: Enabling Efficient Attack Investigation from System Monitoring Data

20. Improving Deep Neural Network Robustness with Siamese Empowered Adversarial Training

21. Revisiting Attacks and Defenses in Connected and Autonomous Vehicles

23. Escaping Backdoor Attack Detection of Deep Learning

25. Crumpled Nanogenerator Based on Elastic Modulus Design for Fully Self-Powered High-Speed Rail Speed Measurement.

26. Editing of ORF138 restores fertility of Ogura cytoplasmic male sterile broccoli via mitoTALENs.

27. Trojan Attack on Deep Generative Models in Autonomous Driving

30. Internet Protocol Cameras with No Password Protection: An Empirical Investigation

33. Interictal magnetic signals in new‐onset Rolandic epilepsy may help with timing of treatment selection.

45. RescQR: Enabling Reliable Data Recovery in Screen-Camera Communication System

47. LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps

Catalog

Books, media, physical & digital resources