Picture for Anmin Fu

Anmin Fu

Intellectual Property Protection for Deep Learning Model and Dataset Intelligence

Add code
Nov 07, 2024
Viaarxiv icon

TruVRF: Towards Triple-Granularity Verification on Machine Unlearning

Add code
Aug 12, 2024
Viaarxiv icon

Decaf: Data Distribution Decompose Attack against Federated Learning

Add code
May 24, 2024
Viaarxiv icon

Machine Unlearning: Taxonomy, Metrics, Applications, Challenges, and Prospects

Add code
Mar 13, 2024
Viaarxiv icon

Vertical Federated Learning: Taxonomies, Threats, and Prospects

Add code
Feb 03, 2023
Figure 1 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 2 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 3 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 4 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Viaarxiv icon

MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World

Add code
Sep 06, 2022
Figure 1 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 2 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 3 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Figure 4 for MACAB: Model-Agnostic Clean-Annotation Backdoor to Object Detection with Natural Trigger in Real-World
Viaarxiv icon

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences

Add code
May 31, 2022
Figure 1 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 2 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 3 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 4 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Viaarxiv icon

Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures

Add code
Apr 13, 2022
Figure 1 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 2 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 3 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Figure 4 for Towards A Critical Evaluation of Robustness for Deep Learning Backdoor Countermeasures
Viaarxiv icon

Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System

Add code
Apr 05, 2022
Figure 1 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 2 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 3 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Figure 4 for Sufficient Reasons for A Zero-Day Intrusion Detection Artificial Immune System
Viaarxiv icon

PPA: Preference Profiling Attack Against Federated Learning

Add code
Feb 10, 2022
Figure 1 for PPA: Preference Profiling Attack Against Federated Learning
Figure 2 for PPA: Preference Profiling Attack Against Federated Learning
Figure 3 for PPA: Preference Profiling Attack Against Federated Learning
Figure 4 for PPA: Preference Profiling Attack Against Federated Learning
Viaarxiv icon