Picture for Yifeng Zheng

Yifeng Zheng

Vertical Federated Learning: Taxonomies, Threats, and Prospects

Add code
Feb 03, 2023
Figure 1 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 2 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 3 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Figure 4 for Vertical Federated Learning: Taxonomies, Threats, and Prospects
Viaarxiv icon

BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label

Add code
Jul 13, 2022
Figure 1 for BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Figure 2 for BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Figure 3 for BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Figure 4 for BadHash: Invisible Backdoor Attacks against Deep Hashing with Clean Label
Viaarxiv icon

Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service

Add code
Feb 16, 2022
Figure 1 for Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service
Figure 2 for Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service
Figure 3 for Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service
Figure 4 for Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service
Viaarxiv icon

Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization

Add code
Feb 04, 2022
Figure 1 for Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
Figure 2 for Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
Figure 3 for Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
Figure 4 for Aggregation Service for Federated Learning: An Efficient, Secure, and More Resilient Realization
Viaarxiv icon

NTD: Non-Transferability Enabled Backdoor Detection

Add code
Nov 22, 2021
Figure 1 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 2 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 3 for NTD: Non-Transferability Enabled Backdoor Detection
Figure 4 for NTD: Non-Transferability Enabled Backdoor Detection
Viaarxiv icon

RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things

Add code
May 11, 2021
Figure 1 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 2 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 3 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Figure 4 for RBNN: Memory-Efficient Reconfigurable Deep Binary Neural Network with IP Protection for Internet of Things
Viaarxiv icon

RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System

Add code
Dec 08, 2020
Figure 1 for RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System
Figure 2 for RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System
Figure 3 for RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System
Figure 4 for RC-SSFL: Towards Robust and Communication-efficient Semi-supervised Federated Learning System
Viaarxiv icon

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks

Add code
Oct 08, 2020
Figure 1 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 2 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 3 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 4 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Viaarxiv icon

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning

Add code
Jul 27, 2020
Figure 1 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 2 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 3 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 4 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Viaarxiv icon