Search Results for author: Lingling Fan

Found 9 papers, 4 papers with code

A Comprehensive Empirical Study of Bugs in Open-Source Federated Learning Frameworks

no code implementations9 Aug 2023 Weijie Shao, Yuyang Gao, Fu Song, Sen Chen, Lingling Fan, JingZhu He

Federated learning (FL) is a distributed machine learning (ML) paradigm, allowing multiple clients to collaboratively train shared machine learning (ML) models without exposing clients' data privacy.

Federated Learning

Towards Understanding and Mitigating Audio Adversarial Examples for Speaker Recognition

1 code implementation7 Jun 2022 Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Feng Wang, Jiashui Wang

According to the characteristic of SRSs, we present 22 diverse transformations and thoroughly evaluate them using 7 recent promising adversarial attacks (4 white-box and 3 black-box) on speaker recognition.

Speaker Recognition speech-recognition +1

AS2T: Arbitrary Source-To-Target Adversarial Attack on Speaker Recognition Systems

no code implementations7 Jun 2022 Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

Recent work has illuminated the vulnerability of speaker recognition systems (SRSs) against adversarial attacks, raising significant security concerns in deploying SRSs.

Adversarial Attack Speaker Recognition

Real-Time Simulation of Level 1, Level 2, and Level 3 Electric Vehicle Charging Systems

no code implementations3 Nov 2021 Li Bao, Lingling Fan, Zhixin Miao

The three testbeds, with their detailed circuit parameters and control parameters presented, can be used as reference testbeds for EV grid integration research.

SEC4SR: A Security Analysis Platform for Speaker Recognition

1 code implementation4 Sep 2021 Guangke Chen, Zhe Zhao, Fu Song, Sen Chen, Lingling Fan, Yang Liu

To bridge this gap, we present SEC4SR, the first platform enabling researchers to systematically and comprehensively evaluate adversarial attacks and defenses in SR. SEC4SR incorporates 4 white-box and 2 black-box attacks, 24 defenses including our novel feature-level transformations.

Speaker Recognition

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation

1 code implementation24 Apr 2020 Bozhi Wu, Sen Chen, Cuiyun Gao, Lingling Fan, Yang Liu, Weiping Wen, Michael R. Lyu

In this paper, to fill this gap, we propose a novel and interpretable ML-based approach (named XMal) to classify malware with high accuracy and explain the classification result meanwhile.

Android Malware Detection Classification +2

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

no code implementations15 Apr 2020 Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu

To launch attacks in the white- and grey-box scenarios, we also propose a sample-based collision attack to gain the knowledge of the target classifier.

CORE: Automating Review Recommendation for Code Changes

no code implementations20 Dec 2019 JingKai Siow, Cuiyun Gao, Lingling Fan, Sen Chen, Yang Liu

The hinge of accurate code review suggestion is to learn good representations for both code changes and reviews.

Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems

1 code implementation3 Nov 2019 Guangke Chen, Sen Chen, Lingling Fan, Xiaoning Du, Zhe Zhao, Fu Song, Yang Liu

In this paper, we conduct the first comprehensive and systematic study of the adversarial attacks on SR systems (SRSs) to understand their security weakness in the practical blackbox setting.

Adversarial Attack Speaker Recognition +2

Cannot find the paper you are looking for? You can Submit a new open access paper.