no code implementations • 31 May 2022 • Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo
In this paper, we present the first large-scale study on the stealthiness of adversarial samples used in the attacks against deep learning.
no code implementations • 19 Jun 2017 • Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, Ji Xiang
In particular, at a negotiated time slot, a customer is required to reboot the compromised device, then a "white" Mirai operated by the manufacturer breaks into the clean-state IoT devices immediately.
Cryptography and Security