no code implementations • 31 Jul 2023 • Yuntao Liu, Qian Huang, Rongpeng Li, Xianfu Chen, Zhifeng Zhao, Shuyuan Zhao, Yongdong Zhu, Honggang Zhang
Collaborative perception by leveraging the shared semantic information plays a crucial role in overcoming the individual limitations of isolated agents.
no code implementations • 27 Jul 2022 • Abhishek Chakraborty, Daniel Xing, Yuntao Liu, Ankur Srivastava
The functionality of a deep learning (DL) model can be stolen via model extraction where an attacker obtains a surrogate model by utilizing the responses from a prediction API of the original model.
no code implementations • 7 Jan 2021 • Yuntao Liu, Michael Zuzak, Yang Xie, Abhishek Chakraborty, Ankur Srivastava
(3) Our experiments show that SAS and RSAS exhibit better SAT resilience than SFLL and have similar effectiveness.
Cryptography and Security Hardware Architecture Formal Languages and Automata Theory
no code implementations • 5 Jun 2019 • Yuntao Liu, Yong Dou, Ruochun Jin, Rongchun Li
In order to optimize models and meet the requirement mentioned above, we propose a method that replaces the fully-connected layers of convolution neural network models with a tree classifier.
no code implementations • 4 Jun 2019 • Yuntao Liu, Yong Dou, Ruochun Jin, Peng Qiao
In image classification, Convolutional Neural Network(CNN) models have achieved high performance with the rapid development in deep learning.
no code implementations • 3 Oct 2017 • Yuntao Liu, Yang Xie, Ankur Srivastava
In many cases, it is more practical to use a neural network intellectual property (IP) that an IP vendor has already trained.
Cryptography and Security