关注
Tianhang Zheng
Tianhang Zheng
在 umkc.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Adversarial attacks and defenses in deep learning
K Ren, T Zheng, Z Qin, X Liu
Engineering 6 (3), 346-360, 2020
5622020
Pointcloud saliency maps
T Zheng, C Chen, J Yuan, B Li, K Ren
Proceedings of the IEEE/CVF international conference on computer vision …, 2019
1982019
Distributionally adversarial attack
T Zheng, C Chen, K Ren
Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 2253-2260, 2019
1412019
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.
Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren
NDSS 2020, 1-18, 2020
992020
Data poisoning attack against knowledge graph embedding
H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren
arXiv preprint arXiv:1904.12052, 2019
822019
FID: Function modeling-based data-independent and channel-robust physical-layer identification
T Zheng, Z Sun, K Ren
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 199-207, 2019
482019
Can we use arbitrary objects to attack lidar perception in autonomous driving?
Y Zhu, C Miao, T Zheng, F Hajiaghajani, L Su, C Qiao
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
462021
Towards understanding the adversarial vulnerability of skeleton-based action recognition
T Zheng, S Liu, C Chen, J Yuan, B Li, K Ren
arXiv preprint arXiv:2005.07151, 2020
202020
Principal curvatures and area ratio of propagating surfaces in isotropic turbulence
T Zheng, J You, Y Yang
Physical Review Fluids 2 (10), 103201, 2017
192017
Poisoning attacks on deep learning based wireless traffic prediction
T Zheng, B Li
IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 660-669, 2022
182022
Towards data poisoning attack against knowledge graph embedding
H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren
arXiv preprint arXiv:1904.12052, 2019
112019
First-order efficient general-purpose clean-label data poisoning
T Zheng, B Li
IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021
82021
Adversarial attacks and defenses in deep learning. Engineering 6, 3 (2020), 346–360
K Ren, T Zheng, Z Qin, X Liu
82020
Learning saliency maps for adversarial point-cloud generation
T Zheng, C Chen, K Ren
arXiv preprint arXiv:1812.01687, 2018
82018
On the robustness of metric learning: an adversarial perspective
M Huai, T Zheng, C Miao, L Yao, A Zhang
ACM Transactions on Knowledge Discovery from Data (TKDD) 16 (5), 1-25, 2022
72022
Guided erasable adversarial attack (GEAA) toward shared data protection
M Zhao, B Wang, W Wang, Y Kong, T Zheng, K Ren
IEEE Transactions on Information Forensics and Security 17, 2468-2482, 2022
62022
Is pgd-adversarial training necessary? Alternative training via a soft-quantization network with noisy-natural samples only
T Zheng, C Chen, K Ren
62018
Adversarial Attacks and Defenses in Deep Learning, Engineering, Volume 6, Issue 3, 2020
K Ren, T Zheng, Z Qin, X Liu
ISSN, 0
5
Infocensor: an information-theoretic framework against sensitive attribute inference and demographic disparity
T Zheng, B Li
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
42022
Accelerometer-based smartphone eavesdropping
Z Ba, T Zheng, Z Qin, H Yu, L Liu, B Li, X Liu, K Ren
Proceedings of the 26th Annual International Conference on Mobile Computing …, 2020
42020
系统目前无法执行此操作,请稍后再试。
文章 1–20