Picture for Sencun Zhu

Sencun Zhu

HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning

Add code
May 10, 2023
Figure 1 for HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Figure 2 for HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Figure 3 for HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Figure 4 for HoneyIoT: Adaptive High-Interaction Honeypot for IoT Devices Through Reinforcement Learning
Viaarxiv icon

Federated Unlearning with Knowledge Distillation

Add code
Jan 24, 2022
Figure 1 for Federated Unlearning with Knowledge Distillation
Figure 2 for Federated Unlearning with Knowledge Distillation
Figure 3 for Federated Unlearning with Knowledge Distillation
Figure 4 for Federated Unlearning with Knowledge Distillation
Viaarxiv icon

AppQ: Warm-starting App Recommendation Based on View Graphs

Add code
Sep 08, 2021
Figure 1 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 2 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 3 for AppQ: Warm-starting App Recommendation Based on View Graphs
Figure 4 for AppQ: Warm-starting App Recommendation Based on View Graphs
Viaarxiv icon

Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder

Add code
Dec 27, 2020
Figure 1 for Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder
Figure 2 for Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder
Figure 3 for Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder
Figure 4 for Recomposition vs. Prediction: A Novel Anomaly Detection for Discrete Events Based On Autoencoder
Viaarxiv icon

Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users

Add code
Dec 27, 2020
Figure 1 for Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
Figure 2 for Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
Figure 3 for Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
Figure 4 for Time-Window Group-Correlation Support vs. Individual Features: A Detection of Abnormal Users
Viaarxiv icon

Mitigating Backdoor Attacks in Federated Learning

Add code
Oct 28, 2020
Figure 1 for Mitigating Backdoor Attacks in Federated Learning
Figure 2 for Mitigating Backdoor Attacks in Federated Learning
Figure 3 for Mitigating Backdoor Attacks in Federated Learning
Figure 4 for Mitigating Backdoor Attacks in Federated Learning
Viaarxiv icon

No Peeking through My Windows: Conserving Privacy in Personal Drones

Add code
Aug 26, 2019
Figure 1 for No Peeking through My Windows: Conserving Privacy in Personal Drones
Figure 2 for No Peeking through My Windows: Conserving Privacy in Personal Drones
Figure 3 for No Peeking through My Windows: Conserving Privacy in Personal Drones
Figure 4 for No Peeking through My Windows: Conserving Privacy in Personal Drones
Viaarxiv icon

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation

Add code
Aug 30, 2018
Figure 1 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 2 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 3 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Figure 4 for Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation
Viaarxiv icon