Picture for Y. Thomas Hou

Y. Thomas Hou

Harvesting Private Medical Images in Federated Learning Systems with Crafted Models

Add code
Jul 13, 2024
Viaarxiv icon

BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning

Add code
Jul 12, 2024
Figure 1 for BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning
Figure 2 for BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning
Figure 3 for BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning
Figure 4 for BoBa: Boosting Backdoor Detection through Data Distribution Inference in Federated Learning
Viaarxiv icon

NoiSec: Harnessing Noise for Security against Adversarial and Backdoor Attacks

Add code
Jun 18, 2024
Viaarxiv icon

ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models

Add code
May 03, 2024
Figure 1 for ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models
Figure 2 for ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models
Figure 3 for ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models
Figure 4 for ProFLingo: A Fingerprinting-based Copyright Protection Scheme for Large Language Models
Viaarxiv icon

Learning-augmented Online Minimization of Age of Information and Transmission Costs

Add code
Mar 05, 2024
Figure 1 for Learning-augmented Online Minimization of Age of Information and Transmission Costs
Figure 2 for Learning-augmented Online Minimization of Age of Information and Transmission Costs
Figure 3 for Learning-augmented Online Minimization of Age of Information and Transmission Costs
Figure 4 for Learning-augmented Online Minimization of Age of Information and Transmission Costs
Viaarxiv icon

Scale-MIA: A Scalable Model Inversion Attack against Secure Federated Learning via Latent Space Reconstruction

Add code
Nov 14, 2023
Viaarxiv icon

CANShield: Signal-based Intrusion Detection for Controller Area Networks

Add code
May 03, 2022
Figure 1 for CANShield: Signal-based Intrusion Detection for Controller Area Networks
Figure 2 for CANShield: Signal-based Intrusion Detection for Controller Area Networks
Figure 3 for CANShield: Signal-based Intrusion Detection for Controller Area Networks
Figure 4 for CANShield: Signal-based Intrusion Detection for Controller Area Networks
Viaarxiv icon

AoI-minimizing Scheduling in UAV-relayed IoT Networks

Add code
Jul 30, 2021
Figure 1 for AoI-minimizing Scheduling in UAV-relayed IoT Networks
Figure 2 for AoI-minimizing Scheduling in UAV-relayed IoT Networks
Figure 3 for AoI-minimizing Scheduling in UAV-relayed IoT Networks
Figure 4 for AoI-minimizing Scheduling in UAV-relayed IoT Networks
Viaarxiv icon