no code implementations • 11 Feb 2025 • Yuxia Sun, Huihong Chen, Jingcai Guo, Aoxiang Sun, Zhetao Li, Haolin Liu
Extensive experiments show that RoMA significantly outperforms seven competing methods in both adversarial robustness (e. g., achieving over 80% robust accuracy-more than twice that of the next-best method under PGD attacks) and training efficiency (e. g., more than twice as fast as the second-best method in terms of accuracy), while maintaining superior standard accuracy in non-adversarial scenarios.
1 code implementation • 13 May 2024 • Shuo Liu, Di Yao, Lanting Fang, Zhetao Li, Wenbin Li, Kaiyu Feng, XiaoWen Ji, Jingping Bi
With the evolving of time, the types of anomaly edges are emerging and the labeled anomaly samples are few for each type.
no code implementations • 21 Apr 2023 • Hangtao Zhang, Zeming Yao, Leo Yu Zhang, Shengshan Hu, Chao Chen, Alan Liew, Zhetao Li
Federated learning (FL) is vulnerable to poisoning attacks, where adversaries corrupt the global aggregation results and cause denial-of-service (DoS).