Browsing byAuthorZhu, T

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 66 to 85 of 159< previous   next >
Issue DateTitleAuthor(s)
2021Game Theoretical Adversarial Deep Learning with Variational AdversariesChivukula, A; Yang, X; Liu, W; Zhu, T; Zhou, W
2020Heterogeneous differential privacy for vertically partitioned databasesXia, Y; Zhu, T; Ding, X; Jin, H; Zou, D
2020-06Hiding Private Information in Images From AIXue, H; Liu, B; Din, M; Song, L; Zhu, T
2024-01-01High-Frequency Matters: Attack and Defense for Image-Processing Model WatermarkingChen, H; Zhu, T; Liu, C; Yu, S; Zhou, W
2022-08-01Image fairness in deep learning: problems, models, and challengesTian, H; Zhu, T; Liu, W; Zhou, W
2023-09-01Improve individual fairness in federated learning via adversarial trainingLi, J; Zhu, T; Ren, W; Raymond, KK
2021-02-09Improving Laplace Mechanism of Differential Privacy by Personalized SamplingHuang, W; Zhou, S; Zhu, T; Liao, Y; Wu, C; Qiu, S
2021-12-15Insight into the enhancing short-chain fatty acids (SCFAs) production from waste activated sludge via polyoxometalates pretreatment: Mechanisms and implications.Guo, H; Wang, Y; Tian, L; Wei, W; Zhu, T; Liu, Y
2022-10-01Insights into N2O turnovers under polyethylene terephthalate microplastics stress in mainstream biological nitrogen removal process.He, Y; Liu, Y; Yan, M; Zhao, T; Liu, Y; Zhu, T; Ni, B-J
2024-01-01Inversion-Guided Defense: Detecting Model Stealing Attacks by Output InvertingZhou, S; Zhu, T; Ye, D; Zhou, W; Zhao, W
2017-05-01Invisible hand: A privacy preserving mobile crowd sensing framework based on economic modelsLiu, B; Zhou, W; Zhu, T; Zhou, H; Lin, X
2018-03-01An iteration-based differentially private social network data releaseZhu, T; Yang, M; Xiong, P; Xiang, Y; Zhou, W
2019-05-19Knowledge Transferring via Model Aggregation for Online Social CareJi, S; Long, G; Pan, S; Zhu, T; Jiang, J; Wang, S; Li, X
2022-01-01Label-Only Membership Inference Attacks and Defenses In Semantic Segmentation ModelsZhang, G; Liu, B; Zhu, T; Ding, M; Zhou, W
2023-01-01Label-Only Model Inversion Attacks: Attack With the Least InformationZhu, T; Ye, D; Zhou, S; Liu, B; Zhou, W
2022-01-01Learning Games for Defending Advanced Persistent Threats in Cyber SystemsZhu, T; Ye, D; Cheng, Z; Zhou, W; Yu, PS
2018-09-14Lico: A Lightweight Access Control Model for Inter-Networking LinkagesLi, S; Ren, W; Zhu, T; Choo, KKR
2024-04Local differential privacy and its applications: A comprehensive surveyYang, M; Guo, T; Zhu, T; Tjuawinata, I; Zhao, J; Lam, K-Y
2018-03-31Location Privacy and Its Applications: A Systematic StudyLiu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y
2018Location Privacy in Mobile ApplicationsLiu, B; Zhou, W; Zhu, T; Xiang, Y; Wang, K