no code implementations • 19 Mar 2025 • Yaofei Duan, Tao Tan, Zhiyuan Zhu, Yuhao Huang, Yuanji Zhang, Rui Gao, Patrick Cheong-Iao Pang, Xinru Gao, Guowei Tao, Xiang Cong, Zhou Li, Lianying Liang, Guangzhi He, Linliang Yin, Xuedong Deng, Xin Yang, Dong Ni
Fetal ultrasound (US) examinations require the acquisition of multiple planes, each providing unique diagnostic information to evaluate fetal development and screening for congenital anomalies.
no code implementations • 6 Mar 2025 • Xiang Zhang, Zhou Li, Kai Wan, Hua Sun, Mingyue Ji, Giuseppe Caire
Secure aggregation is motivated by federated learning (FL) where a cloud server aims to compute an averaged model (i. e., weights of deep neural networks) of the locally-trained models of numerous clients, while adhering to data security requirements.
no code implementations • 2 Mar 2024 • Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li
Large language models (LLMs) have demonstrated impressive results on natural language tasks, and security researchers are beginning to employ them in both offensive and defensive systems.
no code implementations • 16 Oct 2023 • Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li
Training a machine learning model with data following a meaningful order, i. e., from easy to hard, has been proven to be effective in accelerating the training process and achieving better model performance.
no code implementations • 14 Jun 2023 • Margarita Geleta, Jiacen Xu, Manikanta Loya, Junlin Wang, Sameer Singh, Zhou Li, Sergio Gago-Masague
We assessed Maestro's influence on students' engagement, motivation, and learning success in robust AI.
1 code implementation • 11 Dec 2021 • Jiacen Xu, Zhe Zhou, Boyuan Feng, Yufei Ding, Zhou Li
As such, we present a comparative study of PCSS robustness.
1 code implementation • 24 May 2020 • Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha
To our knowledge, this is the first LDP algorithm for publishing streaming data.
no code implementations • 31 Aug 2019 • Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang
However, in the meantime, such a fast-growing technology has also introduced new privacy issues, which need to be better understood and measured.
Cryptography and Security
no code implementations • 5 Jan 2018 • Shuaike Dong, Menghao Li, Wenrui Diao, Xiangyu Liu, Jian Liu, Zhou Li, Fenghao Xu, Kai Chen, Xiao-Feng Wang, Kehuan Zhang
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Cryptography and Security