Search Results for author: Cong Wu

Found 19 papers, 4 papers with code

\textsc{Perseus}: Tracing the Masterminds Behind Cryptocurrency Pump-and-Dump Schemes

no code implementations3 Mar 2025 Honglin Fu, Yebo Feng, Cong Wu, Jiahua Xu

Previous research detects pump-and-dump activities in the market, predicts the target cryptocurrency, and examines investors and \ac{osn} entities.

Fraud Detection

Exploiting Vulnerabilities in Speech Translation Systems through Targeted Adversarial Attacks

no code implementations2 Mar 2025 Chang Liu, Haolin Wu, Xi Yang, Kui Zhang, Cong Wu, Weiming Zhang, Nenghai Yu, Tianwei Zhang, Qing Guo, Jie Zhang

As speech translation (ST) systems become increasingly prevalent, understanding their vulnerabilities is crucial for ensuring robust and reliable communication.

Translation

Secure Resource Allocation via Constrained Deep Reinforcement Learning

no code implementations20 Jan 2025 Jianfei Sun, Qiang Gao, Cong Wu, Yuxian Li, Jiacheng Wang, Dusit Niyato

The proliferation of Internet of Things (IoT) devices and the advent of 6G technologies have introduced computationally intensive tasks that often surpass the processing capabilities of user devices.

Deep Reinforcement Learning Distributed Computing +2

Rethinking Membership Inference Attacks Against Transfer Learning

no code implementations20 Jan 2025 Cong Wu, Jing Chen, Qianru Fang, Kun He, Ziming Zhao, Hao Ren, Guowen Xu, Yang Liu, Yang Xiang

The interaction between teacher and student models in transfer learning has not been thoroughly explored in MIAs, potentially resulting in an under-examined aspect of privacy vulnerabilities within transfer learning.

Transfer Learning

LEO-Split: A Semi-Supervised Split Learning Framework over LEO Satellite Networks

no code implementations2 Jan 2025 Zheng Lin, Yuxin Zhang, Zhe Chen, Zihan Fang, Cong Wu, Xianhao Chen, Yue Gao, Jun Luo

However, the intermittent connectivity between LEO satellites and ground station (GS) significantly hinders the timely transmission of raw data to GS for centralized learning, while the scaled-up DL models hamper distributed learning on resource-constrained LEO satellites.

Adaptive Hyper-Graph Convolution Network for Skeleton-based Human Action Recognition with Virtual Connections

no code implementations22 Nov 2024 Youwei Zhou, Tianyang Xu, Cong Wu, XiaoJun Wu, Josef Kittler

The shared topology of human skeletons motivated the recent investigation of graph convolutional network (GCN) solutions for action recognition.

Action Recognition Temporal Action Localization

HeteroSample: Meta-path Guided Sampling for Heterogeneous Graph Representation Learning

no code implementations11 Nov 2024 Ao Liu, Jing Chen, Ruiying Du, Cong Wu, Yebo Feng, Teng Li, Jianfeng Ma

Efficient analysis of these graphs is critical for deriving insights in IoT scenarios such as smart cities, industrial IoT, and intelligent transportation systems.

Computational Efficiency Graph Representation Learning +2

An Efficient Privacy-aware Split Learning Framework for Satellite Communications

no code implementations13 Sep 2024 Jianfei Sun, Cong Wu, Shahid Mumtaz, Junyi Tao, Mingsheng Cao, Mei Wang, Valerio Frascolla

Our framework not only significantly improves the operational efficiency of satellite communications but also establishes a new benchmark in privacy-aware distributed learning, potentially revolutionizing data handling in space-based networks.

Computational Efficiency

Privacy-preserving Universal Adversarial Defense for Black-box Models

no code implementations20 Aug 2024 Qiao Li, Cong Wu, Jing Chen, Zijun Zhang, Kun He, Ruiying Du, Xinxin Wang, Qingchuang Zhao, Yang Liu

Comparative evaluations between the certified defenses of the surrogate and target models demonstrate the effectiveness of our approach.

Adversarial Defense Autonomous Driving +2

An Improved Graph Pooling Network for Skeleton-Based Action Recognition

no code implementations25 Apr 2024 Cong Wu, Xiao-Jun Wu, Tianyang Xu, Josef Kittler

Pooling is a crucial operation in computer vision, yet the unique structure of skeletons hinders the application of existing pooling strategies to skeleton graph modelling.

Action Recognition Skeleton Based Action Recognition

CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning

1 code implementation24 Apr 2024 Haolin Wu, Jing Chen, Ruiying Du, Cong Wu, Kun He, Xingcan Shang, Hao Ren, Guowen Xu

The detection models exhibited vulnerabilities, with FAR rising to 36. 69%, 31. 23%, and 51. 28% under volume control, fading, and noise injection, respectively.

Audio Deepfake Detection Contrastive Learning +1

On the Effectiveness of Distillation in Mitigating Backdoors in Pre-trained Encoder

1 code implementation6 Mar 2024 Tingxu Han, Shenghan Huang, Ziqi Ding, Weisong Sun, Yebo Feng, Chunrong Fang, Jun Li, Hanwei Qian, Cong Wu, Quanjun Zhang, Yang Liu, Zhenyu Chen

Distillation aims to distill knowledge from a given model (a. k. a the teacher net) and transfer it to another (a. k. a the student net).

Image Classification

CryptMPI: A Fast Encrypted MPI Library

1 code implementation13 Oct 2020 Abu Naser, Cong Wu, Mehran Sadeghi Lahijani, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, Xin Yuan

The cloud infrastructure must provide security for High-Performance Computing (HPC) applications of sensitive data to execute in such an environment.

Distributed, Parallel, and Cluster Computing Cryptography and Security

Performance Evaluation and Modeling of Cryptographic Libraries for MPI Communications

1 code implementation13 Oct 2020 Abu Naser, Mehran Sadeghi Lahijani, Cong Wu, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, Xin Yuan

In order for High-Performance Computing (HPC) applications with data security requirements to execute in the public cloud, the cloud infrastructure must ensure the privacy and integrity of data.

Distributed, Parallel, and Cluster Computing Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.