Issue Date | Title | Author(s) |
2021-01-01 | Fooling intrusion detection systems using adversarially autoencoder | Chen, J; Wu, D; Zhao, Y; Sharma, N; Blumenstein, M; Yu, S |
2022-01-01 | Chronos: Accelerating Federated Learning with Resource Aware Training Volume Tuning at Network Edges | Liu, Y; Zhang, X; Zhao, Y; He, Y; Yu, S; Zhu, K |
2022-03-22 | Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks | Zhao, Y; Chen, J; Zhang, J; Wu, D; Blumenstein, M; Yu, S |
2022-01-01 | DRL-based Resource Allocation Optimization for Computation Offloading in Mobile Edge Computing | Wu, G; Zhao, Y; Shen, Y; Zhang, H; Shen, S; Yu, S |
2021-01-01 | AdverseGen: A Practical Tool for Generating Adversarial Examples to Deep Neural Networks Using Black-Box Approaches | Zhang, K; Wu, K; Chen, S; Zhao, Y; Yao, X |
2016-01-01 | A Game-Theoretic Resource Allocation Approach for Intercell Device-to-Device Communications in Cellular Networks | Huang, J; Yin, Y; Zhao, Y; Duan, Q; Wang, W; Yu, S |
2022-02-01 | Private-encoder: Enforcing privacy in latent space for human face images | Zhao, Y; Liu, B; Zhu, T; Ding, M; Zhou, W |
2020-01-01 | Network Anomaly Detection Using Federated Learning and Transfer Learning | Zhao, Y; Chen, J; Guo, Q; Teng, J; Wu, D |
2023-01-07 | Proactive Deepfake Defence via Identity Watermarking | Zhao, Y; Liu, B; Ding, M; Liu, B; Zhu, T; Yu, X |
2019-08-01 | Network anomaly detection by using a time-decay closed frequent pattern | Zhao, Y; Chen, J; Wu, D; Teng, J; Sharma, N; Sajjanhar, A; Blumenstein, M |