Search Results for author: Zhou Li

Found 9 papers, 2 papers with code

FetalFlex: Anatomy-Guided Diffusion Model for Flexible Control on Fetal Ultrasound Image Synthesis

no code implementations19 Mar 2025 Yaofei Duan, Tao Tan, Zhiyuan Zhu, Yuhao Huang, Yuanji Zhang, Rui Gao, Patrick Cheong-Iao Pang, Xinru Gao, Guowei Tao, Xiang Cong, Zhou Li, Lianying Liang, Guangzhi He, Linliang Yin, Xuedong Deng, Xin Yang, Dong Ni

Fetal ultrasound (US) examinations require the acquisition of multiple planes, each providing unique diagnostic information to evaluate fetal development and screening for congenital anomalies.

Anatomy Anomaly Detection +3

Fundamental Limits of Hierarchical Secure Aggregation with Cyclic User Association

no code implementations6 Mar 2025 Xiang Zhang, Zhou Li, Kai Wan, Hua Sun, Mingyue Ji, Giuseppe Caire

Secure aggregation is motivated by federated learning (FL) where a cloud server aims to compute an averaged model (i. e., weights of deep neural networks) of the locally-trained models of numerous clients, while adhering to data security requirements.

Distributed Computing Federated Learning

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

no code implementations2 Mar 2024 Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li

Large language models (LLMs) have demonstrated impressive results on natural language tasks, and security researchers are beginning to employ them in both offensive and defensive systems.

Computer Security Language Modeling +2

A Comprehensive Study of Privacy Risks in Curriculum Learning

no code implementations16 Oct 2023 Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li

Training a machine learning model with data following a meaningful order, i. e., from easy to hard, has been proven to be effective in accelerating the training process and achieving better model performance.

Attribute Inference Attack +3

Maestro: A Gamified Platform for Teaching AI Robustness

no code implementations14 Jun 2023 Margarita Geleta, Jiacen Xu, Manikanta Loya, Junlin Wang, Sameer Singh, Zhou Li, Sergio Gago-Masague

We assessed Maestro's influence on students' engagement, motivation, and learning success in robust AI.

Active Learning

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks

no code implementations31 Aug 2019 Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang

However, in the meantime, such a fast-growing technology has also introduced new privacy issues, which need to be better understood and measured.

Cryptography and Security

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

no code implementations5 Jan 2018 Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiao-Feng Wang, Kehuan Zhang

In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.