Picture for Jialiang Lu

Jialiang Lu

AVS-Net: Audio-Visual Scale Net for Self-supervised Monocular Metric Depth Estimation

Add code
Dec 02, 2024
Viaarxiv icon

Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records

Add code
Jul 15, 2023
Figure 1 for Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records
Figure 2 for Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records
Figure 3 for Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records
Figure 4 for Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records
Viaarxiv icon

An Interpretable Federated Learning-based Network Intrusion Detection Framework

Add code
Jan 10, 2022
Figure 1 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 2 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 3 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Figure 4 for An Interpretable Federated Learning-based Network Intrusion Detection Framework
Viaarxiv icon

Fingerprinting Multi-exit Deep Neural Network Models via Inference Time

Add code
Oct 07, 2021
Figure 1 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 2 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 3 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Figure 4 for Fingerprinting Multi-exit Deep Neural Network Models via Inference Time
Viaarxiv icon

TDGIA:Effective Injection Attacks on Graph Neural Networks

Add code
Jun 12, 2021
Figure 1 for TDGIA:Effective Injection Attacks on Graph Neural Networks
Figure 2 for TDGIA:Effective Injection Attacks on Graph Neural Networks
Figure 3 for TDGIA:Effective Injection Attacks on Graph Neural Networks
Figure 4 for TDGIA:Effective Injection Attacks on Graph Neural Networks
Viaarxiv icon

Hidden Backdoors in Human-Centric Language Models

Add code
May 01, 2021
Figure 1 for Hidden Backdoors in Human-Centric Language Models
Figure 2 for Hidden Backdoors in Human-Centric Language Models
Figure 3 for Hidden Backdoors in Human-Centric Language Models
Figure 4 for Hidden Backdoors in Human-Centric Language Models
Viaarxiv icon