Picture for Fengyuan Xu

Fengyuan Xu

FLiP: Privacy-Preserving Federated Learning based on the Principle of Least Privileg

Add code
Oct 25, 2024
Viaarxiv icon

Making Every Frame Matter: Continuous Video Understanding for Large Models via Adaptive State Modeling

Add code
Oct 19, 2024
Viaarxiv icon

Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?

Add code
Sep 24, 2024
Figure 1 for Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Figure 2 for Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Figure 3 for Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Figure 4 for Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
Viaarxiv icon

CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation

Add code
Sep 04, 2024
Figure 1 for CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation
Figure 2 for CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation
Figure 3 for CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation
Figure 4 for CoAst: Validation-Free Contribution Assessment for Federated Learning based on Cross-Round Valuation
Viaarxiv icon

Manipulating Transfer Learning for Property Inference

Add code
Mar 21, 2023
Viaarxiv icon

Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection

Add code
Jun 18, 2021
Figure 1 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Figure 2 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Figure 3 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Figure 4 for Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
Viaarxiv icon

Stealthy Backdoors as Compression Artifacts

Add code
Apr 30, 2021
Figure 1 for Stealthy Backdoors as Compression Artifacts
Figure 2 for Stealthy Backdoors as Compression Artifacts
Figure 3 for Stealthy Backdoors as Compression Artifacts
Figure 4 for Stealthy Backdoors as Compression Artifacts
Viaarxiv icon

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence

Add code
Jan 17, 2021
Figure 1 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Figure 2 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Figure 3 for A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
Viaarxiv icon

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

Add code
Oct 26, 2020
Figure 1 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 2 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 3 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Figure 4 for Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
Viaarxiv icon

Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem

Add code
Apr 07, 2020
Figure 1 for Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem
Figure 2 for Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem
Figure 3 for Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem
Figure 4 for Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem
Viaarxiv icon