no code implementations • 17 Jul 2023 • Rongke Liu, Dong Wang, Yizhi Ren, Zhen Wang, Kaitian Guo, Qianqian Qin, Xiaolei Liu
Therefore, the attack models in existing MIAs are difficult to effectively train with the knowledge of the target model, resulting in sub-optimal attacks.
1 code implementation • 1 Oct 2017 • Yuanfang Chen, Falin Chen, Yizhi Ren, Ting Wu, Ye Yao
However, as the mobile data of vehicles has been widely collected by sensor-embedded devices in transportation systems, it is possible to predict the traffic flow by analysing mobile data.