1 code implementation • 30 Aug 2019 • Tianhao Wang, Bolin Ding, Min Xu, Zhicong Huang, Cheng Hong, Jingren Zhou, Ninghui Li, Somesh Jha
When collecting information, local differential privacy (LDP) alleviates privacy concerns of users because their private information is randomized before being sent it to the central aggregator.
no code implementations • 12 Oct 2019 • Zhaorui Li, Zhicong Huang, Chaochao Chen, Cheng Hong
In this paper, we discuss the leakage based on a federated approximated logistic regression model and show that such gradient's leakage could leak the complete training data if all elements of the inputs are either 0 or 1.
Cryptography and Security
1 code implementation • 11 Feb 2020 • Cheng Hong, Zhicong Huang, Wen-jie Lu, Hunter Qu, Li Ma, Morten Dahl, Jason Mancuso
Machine learning (ML) methods have been widely used in genomic studies.
Cryptography and Security
1 code implementation • ICCV 2021 • Zhicong Huang, Xuemei Hu, Zhou Xue, Weizhu Xu, Tao Yue
Light field images contain both angular and spatial information of captured light rays.
no code implementations • 20 Oct 2022 • Zhicong Huang, Jingwen Zhao, Zhijie Zheng, Dihu Chena, Haifeng Hu
In this paper, we propose a pillar set abstraction (PSA) and foreground point compensation (FPC) and design a point-based detection network, PSA-Det3D, to improve the detection performance for small object.