Picture for Shangqing Zhao

Shangqing Zhao

Quantum Machine Learning: Performance and Security Implications in Real-World Applications

Add code
Aug 08, 2024
Viaarxiv icon

Pancreatic Tumor Segmentation as Anomaly Detection in CT Images Using Denoising Diffusion Models

Add code
Jun 04, 2024
Viaarxiv icon

Temporal Knowledge Graph Completion with Time-sensitive Relations in Hypercomplex Space

Add code
Mar 02, 2024
Viaarxiv icon

BIBench: Benchmarking Data Analysis Knowledge of Large Language Models

Add code
Jan 01, 2024
Viaarxiv icon

Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security

Add code
Jun 09, 2023
Viaarxiv icon

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Add code
Jul 26, 2022
Figure 1 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 2 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 3 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 4 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Viaarxiv icon

LoMar: A Local Defense Against Poisoning Attack on Federated Learning

Add code
Jan 08, 2022
Figure 1 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 2 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 3 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 4 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Viaarxiv icon

Adversarial Machine Learning based Partial-model Attack in IoT

Add code
Jul 10, 2020
Figure 1 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 2 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 3 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 4 for Adversarial Machine Learning based Partial-model Attack in IoT
Viaarxiv icon

When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing

Add code
May 04, 2019
Figure 1 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Figure 2 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Figure 3 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Figure 4 for When Attackers Meet AI: Learning-empowered Attacks in Cooperative Spectrum Sensing
Viaarxiv icon