UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Frequency-constrained transferable adversarial attack on image manipulation detection and localization Journal article
Zeng, Yijia, Pun, Chi Man. Frequency-constrained transferable adversarial attack on image manipulation detection and localization[J]. The Visual Computer, 2024, 40(7), 4817-4828.
Authors:  Zeng, Yijia;  Pun, Chi Man
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:3.0/3.0 | Submit date:2024/07/04
Adversarial Attack  Forgery Image Detection And Localization  Reverse Image Forensics  Transferability  
Out-of-Distribution Detection of Unknown False Data Injection Attack With Logit-Normalized Bayesian ResNet Journal article
Feng, Guangxu, Lao, Keng Weng, Chen, Ge. Out-of-Distribution Detection of Unknown False Data Injection Attack With Logit-Normalized Bayesian ResNet[J]. IEEE Transactions on Smart Grid, 2024.
Authors:  Feng, Guangxu;  Lao, Keng Weng;  Chen, Ge
Favorite | TC[WOS]:0 TC[Scopus]:1  IF:8.6/9.6 | Submit date:2024/07/04
Bayes Methods  Bayesian Neural Network  Current Measurement  Deep Learning  Epistemic Uncertainty  False Data Injection Attack  Neural Networks  Out-of-distribution Detection  Training  Uncertainty  Uncertainty Calibration  Vectors  
FGFL: A blockchain-based fair incentive governor for Federated Learning Journal article
Liang Gao, Li Li, Yingwen Chen, Cheng Zhong Xu, Ming Xu. FGFL: A blockchain-based fair incentive governor for Federated Learning[J]. Journal of Parallel and Distributed Computing, 2022, 163, 283-299.
Authors:  Liang Gao;  Li Li;  Yingwen Chen;  Cheng Zhong Xu;  Ming Xu
Favorite | TC[WOS]:28 TC[Scopus]:41  IF:3.4/3.4 | Submit date:2022/05/13
Attack Detection  Federated Learning  Incentive Mechanism  
FIFL: A Fair Incentive Mechanism for Federated Learning Conference paper
Liang Gao, Li Li, Yingwen Chen, Wenli Zheng, ChengZhong Xu, Ming Xu. FIFL: A Fair Incentive Mechanism for Federated Learning[C], 2021, 326 - 329.
Authors:  Liang Gao;  Li Li;  Yingwen Chen;  Wenli Zheng;  ChengZhong Xu; et al.
Favorite | TC[WOS]:16 TC[Scopus]:29 | Submit date:2021/12/08
Attack Detection  Federated Learning  Incentive Mechanism  
Fooling deep neural detection networks with adaptive object-oriented adversarial perturbation Journal article
Xiao, Yatie, Pun, Chi Man, Liu, Bo. Fooling deep neural detection networks with adaptive object-oriented adversarial perturbation[J]. Pattern Recognition, 2021, 115, 107903.
Authors:  Xiao, Yatie;  Pun, Chi Man;  Liu, Bo
Favorite | TC[WOS]:26 TC[Scopus]:30  IF:7.5/7.6 | Submit date:2021/12/08
Adaptive Object-oriented Perturbation  Adversarial Attack  Object Detection  
IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks Journal article
Xia, Zhuoqun, Tan, Jingjing, Gu, Ke, Li, Xiong, Jia, Weijia. IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(2), 995-1008.
Authors:  Xia, Zhuoqun;  Tan, Jingjing;  Gu, Ke;  Li, Xiong;  Jia, Weijia
Favorite | TC[WOS]:9 TC[Scopus]:10  IF:6.7/6.0 | Submit date:2021/12/07
Advanced Adaptive Attack  Evolutionary Game  Evolutionary Stability Strategy  Intelligent Configuration  Intrusion Detection System.  
Audio Replay Spoof Attack Detection by Joint Segment-Based Linear Filter Bank Feature Extraction and Attention-Enhanced DenseNet-BiLSTM Network Journal article
Huang,Lian, Pun,Chi Man. Audio Replay Spoof Attack Detection by Joint Segment-Based Linear Filter Bank Feature Extraction and Attention-Enhanced DenseNet-BiLSTM Network[J]. IEEE/ACM Transactions on Audio Speech and Language Processing, 2020, 28, 1813-1825.
Authors:  Huang,Lian;  Pun,Chi Man
Favorite | TC[WOS]:30 TC[Scopus]:42  IF:4.1/4.2 | Submit date:2021/03/11
Attack Detection  Attention-enhanced  Densenet-bilstm Network  Linear Filter Bank Feature  Replay Spoof  
Audio Replay Spoof Attack Detection Using Segment-based Hybrid Feature and DenseNet-LSTM Network Conference paper
Lian Huang, Chi-Man Pun. Audio Replay Spoof Attack Detection Using Segment-based Hybrid Feature and DenseNet-LSTM Network[C]:IEEE, 2019, 2567-2571.
Authors:  Lian Huang;  Chi-Man Pun
Favorite | TC[WOS]:22 TC[Scopus]:29 | Submit date:2021/03/11
Asv Spoof  Densenet  Lstm  Replay Spoof Attack Detection  Speaker Verification