Picture for Zhuo Lu

Zhuo Lu

Parrot-Trained Adversarial Examples: Pushing the Practicality of Black-Box Audio Attacks against Speaker Recognition Models

Add code
Nov 17, 2023
Viaarxiv icon

Data-Driven Next-Generation Wireless Networking: Embracing AI for Performance and Security

Add code
Jun 09, 2023
Viaarxiv icon

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Add code
Jul 26, 2022
Figure 1 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 2 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 3 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Figure 4 for Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception
Viaarxiv icon

Generalized Federated Learning via Sharpness Aware Minimization

Add code
Jun 06, 2022
Figure 1 for Generalized Federated Learning via Sharpness Aware Minimization
Figure 2 for Generalized Federated Learning via Sharpness Aware Minimization
Figure 3 for Generalized Federated Learning via Sharpness Aware Minimization
Figure 4 for Generalized Federated Learning via Sharpness Aware Minimization
Viaarxiv icon

IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification

Add code
Jan 10, 2022
Figure 1 for IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification
Figure 2 for IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification
Figure 3 for IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification
Figure 4 for IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification
Viaarxiv icon

LoMar: A Local Defense Against Poisoning Attack on Federated Learning

Add code
Jan 08, 2022
Figure 1 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 2 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 3 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Figure 4 for LoMar: A Local Defense Against Poisoning Attack on Federated Learning
Viaarxiv icon

FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation

Add code
Dec 22, 2021
Figure 1 for FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation
Figure 2 for FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation
Figure 3 for FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation
Figure 4 for FedLGA: Towards System-Heterogeneity of Federated Learning via Local Gradient Approximation
Viaarxiv icon

Context-Aware Online Client Selection for Hierarchical Federated Learning

Add code
Dec 03, 2021
Figure 1 for Context-Aware Online Client Selection for Hierarchical Federated Learning
Figure 2 for Context-Aware Online Client Selection for Hierarchical Federated Learning
Figure 3 for Context-Aware Online Client Selection for Hierarchical Federated Learning
Figure 4 for Context-Aware Online Client Selection for Hierarchical Federated Learning
Viaarxiv icon

Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients

Add code
Feb 12, 2021
Figure 1 for Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients
Figure 2 for Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients
Figure 3 for Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients
Figure 4 for Stragglers Are Not Disaster: A Hybrid Federated Learning Algorithm with Delayed Gradients
Viaarxiv icon

Adversarial Machine Learning based Partial-model Attack in IoT

Add code
Jul 10, 2020
Figure 1 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 2 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 3 for Adversarial Machine Learning based Partial-model Attack in IoT
Figure 4 for Adversarial Machine Learning based Partial-model Attack in IoT
Viaarxiv icon