Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions
Gong, Xueluan, Chen, Yanjiao, Wang, Qian, Kong, Weihan
Published in IEEE wireless communications (01.04.2023)
Published in IEEE wireless communications (01.04.2023)
Get full text
Journal Article
MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning
Chen, Yanjiao, Zheng, Zhicong, Gong, Xueluan
Published in IEEE transactions on dependable and secure computing (01.09.2023)
Published in IEEE transactions on dependable and secure computing (01.09.2023)
Get full text
Journal Article
BAD-FM: Backdoor Attacks Against Factorization-Machine Based Neural Network for Tabular Data Prediction
Meng, Lingshuo, Gong, Xueluan, Chen, Yanjiao
Published in Chinese Journal of Electronics (01.07.2024)
Published in Chinese Journal of Electronics (01.07.2024)
Get full text
Journal Article
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers
Gong, Xueluan, Chen, Yanjiao, Huang, Huayang, Liao, Yuqing, Wang, Shuai, Wang, Qian
Published in IEEE network (01.01.2022)
Published in IEEE network (01.01.2022)
Get full text
Journal Article
A GAN-based Defense Framework against Model Inversion Attacks
Gong, Xueluan, Wang, Ziyao, Li, Shuaike, Chen, Yanjiao, Wang, Qian
Published in IEEE transactions on information forensics and security (01.01.2023)
Published in IEEE transactions on information forensics and security (01.01.2023)
Get full text
Journal Article
Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments
Chen, Yanjiao, Gong, Xueluan, Wang, Qian, Di, Xing, Huang, Huayang
Published in IEEE network (01.09.2020)
Published in IEEE network (01.09.2020)
Get full text
Journal Article
Backdoor Attack With Sparse and Invisible Trigger
Gao, Yinghua, Li, Yiming, Gong, Xueluan, Li, Zhifeng, Xia, Shu-Tao, Wang, Qian
Published in IEEE transactions on information forensics and security (2024)
Published in IEEE transactions on information forensics and security (2024)
Get full text
Journal Article
Meta-Learning for Human-Centered Wireless Sensing: Architecture, Applications, and Challenges
Xue, Meng, Chen, Yanjiao, Gong, Xueluan, Cao, Houze, Zhang, Jian, Zhang, Qian
Published in IEEE network (01.01.2023)
Published in IEEE network (01.01.2023)
Get full text
Journal Article
KerbNet: A QoE-Aware Kernel-Based Backdoor Attack Framework
Gong, Xueluan, Chen, Yanjiao, Huang, Huayang, Kong, Weihan, Wang, Ziyao, Shen, Chao, Wang, Qian
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Get full text
Journal Article
SwiftTheft: A Time-Efficient Model Extraction Attack Framework Against Cloud-Based Deep Neural Networks
Yang, Wenbin, Gong, Xueluan, Chen, Yanjiao, Wang, Qian, Dong, Jianshuo
Published in Chinese Journal of Electronics (01.01.2024)
Published in Chinese Journal of Electronics (01.01.2024)
Get full text
Journal Article
D-DAE: Defense-Penetrating Model Extraction Attacks
Chen, Yanjiao, Guan, Rui, Gong, Xueluan, Dong, Jianshuo, Xue, Meng
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01.05.2023)
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01.05.2023)
Get full text
Conference Proceeding
Kaleidoscope: Physical Backdoor Attacks against Deep Neural Networks with RGB Filters
Gong, Xueluan, Wang, Ziyao, Chen, Yanjiao, Xue, Meng, Wang, Qian, Shen, Chao
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Palette: Physically-Realizable Backdoor Attacks Against Video Recognition Models
Gong, Xueluan, Fang, Zheng, Li, Bowen, Wang, Tao, Chen, Yanjiao, Wang, Qian
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Get full text
Journal Article
Crowdcaching: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT
Chen, Yanjiao, Gong, Xueluan, Ou, Runmin, Duan, Lingjie, Zhang, Qian
Published in IEEE internet of things journal (01.06.2020)
Published in IEEE internet of things journal (01.06.2020)
Get full text
Journal Article
Leveraging Label Information for Stealthy Data Stealing in Vertical Federated Learning
Yao, Duanyi, Li, Songze, Gong, Xueluan, Hou, Sizai, Pan, Gaoning
Published in arXiv.org (30.04.2024)
Published in arXiv.org (30.04.2024)
Get full text
Paper
Journal Article
Backdoor Attack with Sparse and Invisible Trigger
Gao, Yinghua, Li, Yiming, Gong, Xueluan, Li, Zhifeng, Shu-Tao, Xia, Wang, Qian
Published in arXiv.org (22.12.2023)
Published in arXiv.org (22.12.2023)
Get full text
Paper
Journal Article
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion
Deng, Jiangyi, Chen, Yanjiao, Zhong, Yinan, Miao, Qianhao, Gong, Xueluan, Xu, Wenyuan
Published in arXiv.org (24.02.2023)
Published in arXiv.org (24.02.2023)
Get full text
Paper
Journal Article