Search Results for author: Fengyuan Xu

Found 8 papers, 5 papers with code

Manipulating Transfer Learning for Property Inference

1 code implementation CVPR 2023 Yulong Tian, Fnu Suya, Anshuman Suri, Fengyuan Xu, David Evans

We demonstrate attacks in which an adversary can manipulate the upstream model to conduct highly effective and specific property inference attacks (AUC score $> 0. 9$), without incurring significant performance loss on the main task.

Transfer Learning

Towards Practical and Efficient Long Video Summary

1 code implementation ICASSP 2022 Xiaopeng Ke, Boyu Chang, Hao Wu, Fengyuan Xu, Sheng Zhong

Recently, video summarization (VS) techniques are widely used to alleviate huge processing pressure brought by numerous long videos.

Video Summarization

Self-supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection

no code implementations18 Jun 2021 Shucheng Li, Fengyuan Xu, Runchuan Wang, Sheng Zhong

In our model, two pretext tasks designed from spatial and temporal perspectives help us effectively learn useful node embedding from the huge amount of unlabelled transaction data.

Graph Learning Node Classification

Stealthy Backdoors as Compression Artifacts

1 code implementation30 Apr 2021 Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans

In a backdoor attack on a machine learning model, an adversary produces a model that performs well on normal inputs but outputs targeted misclassifications on inputs containing a small trigger pattern.

Backdoor Attack Model Compression +1

LEAP: TrustZone Based Developer-Friendly TEE for Intelligent Mobile Apps

no code implementations4 Feb 2021 Lizhi Sun, Shuocheng Wang, Hao Wu, Yuhang Gong, Fengyuan Xu, Yunxin Liu, Hao Han, Sheng Zhong

ARM TrustZone is widely deployed on commercial-off-the-shelf mobile devices for secure execution.

Cryptography and Security

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

1 code implementation26 Oct 2020 Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song

Log-based cyber threat hunting has emerged as an important solution to counter sophisticated attacks.

Cannot find the paper you are looking for? You can Submit a new open access paper.