Kernel-based adversarial attacks and defenses on support vector classification
Li, Wanman, Liu, Xiaozhang, Yan, Anli, Yang, Jie
Published in Digital communications and networks (01.08.2022)
Published in Digital communications and networks (01.08.2022)
Get full text
Journal Article
Querying little is enough: Model inversion attack via latent information
Mo, Kanghua, Liu, Xiaozhang, Huang, Teng, Yan, Anli
Published in International journal of intelligent systems (01.02.2021)
Published in International journal of intelligent systems (01.02.2021)
Get full text
Journal Article
Explanation leaks: Explanation-guided model extraction attacks
Yan, Anli, Huang, Teng, Ke, Lishan, Liu, Xiaozhang, Chen, Qi, Dong, Changyu
Published in Information sciences (01.06.2023)
Published in Information sciences (01.06.2023)
Get full text
Journal Article
MTL-Leak: Privacy Risk Assessment in Multi-Task Learning
Yan, Hongyang, Yan, Anli, Hu, Li, Liang, Jiaming, Hu, Haibo
Published in IEEE transactions on dependable and secure computing (01.01.2024)
Published in IEEE transactions on dependable and secure computing (01.01.2024)
Get full text
Journal Article
Holistic Implicit Factor Evaluation of Model Extraction Attacks
Yan, Anli, Yan, Hongyang, Hu, Li, Liu, Xiaozhang, Huang, Teng
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Published in IEEE transactions on dependable and secure computing (01.11.2023)
Get full text
Journal Article
Explanation-based data-free model extraction attacks
Yan, Anli, Hou, Ruitao, Yan, Hongyang, Liu, Xiaozhang
Published in World wide web (Bussum) (01.09.2023)
Published in World wide web (Bussum) (01.09.2023)
Get full text
Journal Article
Effective detection of mobile malware behavior based on explainable deep neural network
Yan, Anli, Chen, Zhenxiang, Zhang, Haibo, Peng, Lizhi, Yan, Qiben, Hassan, Muhammad Umair, Zhao, Chuan, Yang, Bo
Published in Neurocomputing (Amsterdam) (17.09.2021)
Published in Neurocomputing (Amsterdam) (17.09.2021)
Get full text
Journal Article
Explanation-Guided Adversarial Example Attacks
Yan, Anli, Liu, Xiaozhang, Li, Wanman, Ye, Hongwei, Li, Lang
Published in Big data research (28.05.2024)
Published in Big data research (28.05.2024)
Get full text
Journal Article
Towards explainable model extraction attacks
Yan, Anli, Hou, Ruitao, Liu, Xiaozhang, Yan, Hongyang, Huang, Teng, Wang, Xianmin
Published in International journal of intelligent systems (01.11.2022)
Published in International journal of intelligent systems (01.11.2022)
Get full text
Journal Article
Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough
Voundi Koe, Arthur Sandor, Ai, Shan, Huang, Pengfei, Yan, Anli, Tang, Juan, Chen, Qi, Mo, Kanghua, Jie, Wanqing, Zhang, Shiwen
Published in Information sciences (01.08.2022)
Published in Information sciences (01.08.2022)
Get full text
Journal Article
DPCL: Contrastive representation learning with differential privacy
Li, Wenjun, Yan, Anli, Wu, Di, Zhu, Taoyu, Huang, Teng, Luo, Xuandi, Wang, Shaowei
Published in International journal of intelligent systems (01.11.2022)
Published in International journal of intelligent systems (01.11.2022)
Get full text
Journal Article
IEdroid:Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles
Liu, Cong, Yan, Anli, Chen, Zhenxiang, Zhang, Haibo, Yan, Qiben, Peng, Lizhi, Zhao, Chuan
Published in 2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS) (01.12.2021)
Published in 2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS) (01.12.2021)
Get full text
Conference Proceeding
Detect Adversarial Examples by Using Feature Autoencoder
Ye, Hongwei, Liu, Xiaozhang, Yan, Anli, Li, Lang, Li, Xiulai
Published in Artificial Intelligence and Security (2022)
Published in Artificial Intelligence and Security (2022)
Get full text
Book Chapter
Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark
Ren, Huali, Yan, Anli, Gao, Chong-zhi, Yan, Hongyang, Zhang, Zhenxin, Li, Jin
Year of Publication 23.05.2024
Year of Publication 23.05.2024
Get full text
Journal Article
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification
Ren, Huali, Yan, Anli, Ren, Xiaojun, Ye, Pei-Gen, Gao, Chong-zhi, Zhou, Zhili, Li, Jin
Year of Publication 25.12.2023
Year of Publication 25.12.2023
Get full text
Journal Article
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update
Yan, Anli, Chen, Zhenxiang, Spolaor, Riccardo, Tan, Shuaishuai, Zhao, Chuan, Peng, Lizhi, Yang, Bo
Published in 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS) (01.06.2020)
Published in 2020 IEEE/ACM 28th International Symposium on Quality of Service (IWQoS) (01.06.2020)
Get full text
Conference Proceeding
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification
Ren, Huali, Yan, Anli, Ren, Xiaojun, Pei-Gen Ye, Chong-zhi Gao, Zhou, Zhili, Li, Jin
Published in arXiv.org (25.12.2023)
Get full text
Published in arXiv.org (25.12.2023)
Paper