Search Results for author: Zheli Liu

Found 4 papers, 2 papers with code

BadActs: A Universal Backdoor Defense in the Activation Space

no code implementations18 May 2024 Biao Yi, Sishuo Chen, Yiming Li, Tong Li, Baolei Zhang, Zheli Liu

Backdoor attacks pose an increasingly severe security threat to Deep Neural Networks (DNNs) during their development stage.

backdoor defense

Fermat Number Transform Based Chromatic Dispersion Compensation and Adaptive Equalization Algorithm

no code implementations7 May 2024 Siyu Chen, Zheli Liu, Weihao Li, Zihe Hu, Mingming Zhang, Sheng Cui, Ming Tang

By introducing the Fermat number transform into chromatic dispersion compensation and adaptive equalization, the computational complexity has been reduced by 68% compared with the con? ventional implementation.

A Survey on Consumer IoT Traffic: Security and Privacy

1 code implementation24 Mar 2024 Yan Jia, Yuxin Song, Zihou Liu, Qingyin Tan, Fangming Wang, Yu Zhang, Zheli Liu

From the security and privacy perspective, this survey seeks out the new characteristics in CIoT traffic analysis, the state-of-the-art progress in CIoT traffic analysis, and the challenges yet to be solved.

LAN: Learning Adaptive Neighbors for Real-Time Insider Threat Detection

1 code implementation14 Mar 2024 Xiangrui Cai, Yang Wang, Sihan Xu, Hao Li, Ying Zhang, Zheli Liu, Xiaojie Yuan

Moreover, LAN can be also applied to post-hoc ITD, surpassing 8 competitive baselines by at least 7. 70% and 4. 03% in AUC on two datasets.

Anomaly Detection Graph structure learning

Cannot find the paper you are looking for? You can Submit a new open access paper.