ARCANE: An Efficient Architecture for Exact Machine Unlearning H Yan, X Li, Z Guo, H Li, F Li, X Lin Proceedings of the Thirty-First International Joint Conference on Artificial …, 2022 | 44 | 2022 |
Monitoring-based differential privacy mechanism against query flooding-based model extraction attack H Yan, X Li, H Li, J Li, W Sun, F Li IEEE Transactions on Dependable and Secure Computing 19 (4), 2680-2694, 2021 | 33 | 2021 |
The optimal upper bound of the number of queries for laplace mechanism under differential privacy X Li, H Li, H Zhu, M Huang Information Sciences 503, 219-237, 2019 | 20 | 2019 |
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation X Li, N Li, W Sun, NZ Gong, H Li USENIX Security Symposium 2023, 2023 | 13 | 2023 |
Protecting regression models with personalized local differential privacy X Li, H Yan, Z Cheng, W Sun, H Li IEEE Transactions on Dependable and Secure Computing 20 (2), 960-974, 2022 | 10 | 2022 |
差分隐私综述 李效光, 李晖, 李凤华, 朱辉 信息安全学报 3 (5), 92-104, 2018 | 7 | 2018 |
Automatic evasion of machine learning-based network intrusion detection systems H Yan, X Li, W Zhang, R Wang, H Li, X Zhao, F Li, X Lin IEEE Transactions on Dependable and Secure Computing, 2023 | 4 | 2023 |
Monitoring-based differential privacy mechanism against query-flooding parameter duplication attack H Yan, X Li, H Li, J Li, W Sun, F Li arXiv preprint arXiv:2011.00418, 2020 | 4 | 2020 |
Key-value data collection with distribution estimation under local differential privacy X Li, H Yan, G Zheng, H Li, F Li Security and Communication Networks 2022, 2022 | 3 | 2022 |
ADDITION: Detecting Adversarial Examples with Image-Dependent Noise Reduction Y Wang, X Li, L Yang, J Ma, H Li IEEE Transactions on Dependable and Secure Computing, 2023 | 2 | 2023 |
多级本地化差分隐私算法推荐框架 王瀚仪, 李效光, 毕文卿, 陈亚虹, 李凤华, 牛犇 通信学报 43 (8), 52-64, 2022 | 2 | 2022 |
RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks H Yan, W Zhang, Q Chen, X Li, W Sun, H Li, X Lin NeurIPS 2023, 2023 | 1 | 2023 |
CODER: Protecting Privacy in Image Retrieval with Differential Privacy H Yan, X Li, W Zhang, Q Chen, B Wang, H Li, X Lin IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
On the Robustness of LDP Protocols for Numerical Attributes under Data Poisoning Attacks X Li, Z Li, N Li, W Sun arXiv:2403.19510, 2024 | | 2024 |
MARS: Automated Protocol Analysis Framework for Internet of Things H Yan, X Li, R Dai, H Li, X Zhao, F Li IEEE Internet of Things Journal 9 (19), 18333-18345, 2022 | | 2022 |