Search Results for author: Xiaolin Xu

Found 13 papers, 6 papers with code

VertexSerum: Poisoning Graph Neural Networks for Link Inference

no code implementations ICCV 2023 Ruyi Ding, Shijin Duan, Xiaolin Xu, Yunsi Fei

Graph neural networks (GNNs) have brought superb performance to various applications utilizing graph structural data, such as social analysis and fraud detection.

Fraud Detection Inference Attack

NNSplitter: An Active Defense Solution for DNN Model via Automated Weight Obfuscation

1 code implementation28 Apr 2023 Tong Zhou, Yukui Luo, Shaolei Ren, Xiaolin Xu

In this work, we propose an active model IP protection scheme, namely NNSplitter, which actively protects the model by splitting it into two parts: the obfuscated model that performs poorly due to weight obfuscation, and the model secrets consisting of the indexes and original values of the obfuscated weights, which can only be accessed by authorized users with the support of the trusted execution environment.

MetaLDC: Meta Learning of Low-Dimensional Computing Classifiers for Fast On-Device Adaption

1 code implementation23 Feb 2023 Yejia Liu, Shijin Duan, Xiaolin Xu, Shaolei Ren

Fast model updates for unseen tasks on intelligent edge devices are crucial but also challenging due to the limited computational power.

Meta-Learning

SDFE-LV: A Large-Scale, Multi-Source, and Unconstrained Database for Spotting Dynamic Facial Expressions in Long Videos

no code implementations18 Sep 2022 Xiaolin Xu, Yuan Zong, Wenming Zheng, Yang Li, Chuangao Tang, Xingxun Jiang, Haolin Jiang

In this paper, we present a large-scale, multi-source, and unconstrained database called SDFE-LV for spotting the onset and offset frames of a complete dynamic facial expression from long videos, which is known as the topic of dynamic facial expression spotting (DFES) and a vital prior step for lots of facial expression analysis tasks.

ObfuNAS: A Neural Architecture Search-based DNN Obfuscation Approach

1 code implementation17 Aug 2022 Tong Zhou, Shaolei Ren, Xiaolin Xu

Nonetheless, we observe that, with only extracting an obfuscated DNN architecture, the adversary can still retrain a substitute model with high performance (e. g., accuracy), rendering the obfuscation techniques ineffective.

Neural Architecture Search

LeHDC: Learning-Based Hyperdimensional Computing Classifier

1 code implementation18 Mar 2022 Shijin Duan, Yejia Liu, Shaolei Ren, Xiaolin Xu

Thanks to the tiny storage and efficient execution, hyperdimensional Computing (HDC) is emerging as a lightweight learning framework on resource-constrained hardware.

A Brain-Inspired Low-Dimensional Computing Classifier for Inference on Tiny Devices

1 code implementation9 Mar 2022 Shijin Duan, Xiaolin Xu, Shaolei Ren

Nonetheless, they have two fundamental drawbacks, heuristic training process and ultra-high dimension, which result in sub-optimal inference accuracy and large model sizes beyond the capability of tiny devices with stringent resource constraints.

Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep Neural Network in Multi-Tenant FPGA

no code implementations5 Nov 2020 Adnan Siraj Rakin, Yukui Luo, Xiaolin Xu, Deliang Fan

Specifically, she can aggressively overload the shared power distribution system of FPGA with malicious power-plundering circuits, achieving adversarial weight duplication (AWD) hardware attack that duplicates certain DNN weight packages during data transmission between off-chip memory and on-chip buffer, to hijack the DNN function of the victim tenant.

Adversarial Attack Cloud Computing +3

EOP: An Encryption-Obfuscation Solution for Protecting PCBs Against Tampering and Reverse Engineering

no code implementations20 Apr 2019 Zimu Guo, Xiaolin Xu, Mark M. Tehranipoor, Domenic Forte

These modules guarantee the stream cipher is correctly synchronized and free from tampering.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.