Adversarial attacks and defenses in deep learning K Ren, T Zheng, Z Qin, X Liu Engineering 6 (3), 346-360, 2020 | 562 | 2020 |
Pointcloud saliency maps T Zheng, C Chen, J Yuan, B Li, K Ren Proceedings of the IEEE/CVF international conference on computer vision …, 2019 | 198 | 2019 |
Distributionally adversarial attack T Zheng, C Chen, K Ren Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 2253-2260, 2019 | 141 | 2019 |
Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer. Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren NDSS 2020, 1-18, 2020 | 99 | 2020 |
Data poisoning attack against knowledge graph embedding H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren arXiv preprint arXiv:1904.12052, 2019 | 82 | 2019 |
FID: Function modeling-based data-independent and channel-robust physical-layer identification T Zheng, Z Sun, K Ren IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 199-207, 2019 | 48 | 2019 |
Can we use arbitrary objects to attack lidar perception in autonomous driving? Y Zhu, C Miao, T Zheng, F Hajiaghajani, L Su, C Qiao Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 46 | 2021 |
Towards understanding the adversarial vulnerability of skeleton-based action recognition T Zheng, S Liu, C Chen, J Yuan, B Li, K Ren arXiv preprint arXiv:2005.07151, 2020 | 20 | 2020 |
Principal curvatures and area ratio of propagating surfaces in isotropic turbulence T Zheng, J You, Y Yang Physical Review Fluids 2 (10), 103201, 2017 | 19 | 2017 |
Poisoning attacks on deep learning based wireless traffic prediction T Zheng, B Li IEEE INFOCOM 2022-IEEE Conference on Computer Communications, 660-669, 2022 | 18 | 2022 |
Towards data poisoning attack against knowledge graph embedding H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren arXiv preprint arXiv:1904.12052, 2019 | 11 | 2019 |
First-order efficient general-purpose clean-label data poisoning T Zheng, B Li IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021 | 8 | 2021 |
Adversarial attacks and defenses in deep learning. Engineering 6, 3 (2020), 346–360 K Ren, T Zheng, Z Qin, X Liu | 8 | 2020 |
Learning saliency maps for adversarial point-cloud generation T Zheng, C Chen, K Ren arXiv preprint arXiv:1812.01687, 2018 | 8 | 2018 |
On the robustness of metric learning: an adversarial perspective M Huai, T Zheng, C Miao, L Yao, A Zhang ACM Transactions on Knowledge Discovery from Data (TKDD) 16 (5), 1-25, 2022 | 7 | 2022 |
Guided erasable adversarial attack (GEAA) toward shared data protection M Zhao, B Wang, W Wang, Y Kong, T Zheng, K Ren IEEE Transactions on Information Forensics and Security 17, 2468-2482, 2022 | 6 | 2022 |
Is pgd-adversarial training necessary? Alternative training via a soft-quantization network with noisy-natural samples only T Zheng, C Chen, K Ren | 6 | 2018 |
Adversarial Attacks and Defenses in Deep Learning, Engineering, Volume 6, Issue 3, 2020 K Ren, T Zheng, Z Qin, X Liu ISSN, 0 | 5 | |
Infocensor: an information-theoretic framework against sensitive attribute inference and demographic disparity T Zheng, B Li Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 4 | 2022 |
Accelerometer-based smartphone eavesdropping Z Ba, T Zheng, Z Qin, H Yu, L Liu, B Li, X Liu, K Ren Proceedings of the 26th Annual International Conference on Mobile Computing …, 2020 | 4 | 2020 |