Adversarial attacks and defenses in deep learning K Ren, T Zheng, Z Qin, X Liu Engineering 6 (3), 346-360, 2020 | 52 | 2020 |
Distributionally adversarial attack T Zheng, C Chen, K Ren Proceedings of the AAAI Conference on Artificial Intelligence 33 (01), 2253-2260, 2019 | 47 | 2019 |
Pointcloud saliency maps T Zheng, C Chen, J Yuan, B Li, K Ren Proceedings of the IEEE/CVF International Conference on Computer Vision …, 2019 | 25* | 2019 |
Data poisoning attack against knowledge graph embedding H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren arXiv preprint arXiv:1904.12052, 2019 | 10 | 2019 |
Principal curvatures and area ratio of propagating surfaces in isotropic turbulence T Zheng, J You, Y Yang Physical Review Fluids 2 (10), 103201, 2017 | 10 | 2017 |
FID: Function modeling-based data-independent and channel-robust physical-layer identification T Zheng, Z Sun, K Ren IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 199-207, 2019 | 9 | 2019 |
Learning-based practical smartphone eavesdropping with built-in accelerometer Z Ba, T Zheng, X Zhang, Z Qin, B Li, X Liu, K Ren Proceedings of the Network and Distributed Systems Security (NDSS) Symposium …, 2020 | 8 | 2020 |
Towards Data Poisoning Attack against Knowledge Graph Embedding H Zhang, T Zheng, J Gao, C Miao, L Su, Y Li, K Ren arXiv preprint arXiv:1904.12052, 2019 | 3 | 2019 |
Is pgd-adversarial training necessary? alternative training via a soft-quantization network with noisy-natural samples only T Zheng, C Chen, K Ren arXiv preprint arXiv:1810.05665, 2018 | 3 | 2018 |
Towards Assessment of Randomized Mechanisms for Certifying Adversarial Robustness T Zheng, D Wang, B Li, J Xu arXiv preprint arXiv:2005.07347, 2020 | 2 | 2020 |
Towards Understanding the Adversarial Vulnerability of Skeleton-based Action Recognition T Zheng, S Liu, C Chen, J Yuan, B Li, K Ren arXiv preprint arXiv:2005.07151, 2020 | 1 | 2020 |
Data Independent Identification for Privacy Preservation T Zheng, Z Sun, K Ren 2017 IEEE Symposium on Privacy-Aware Computing (PAC), 186-187, 2017 | 1 | 2017 |
Accelerometer-based smartphone eavesdropping Z Ba, T Zheng, Z Qin, H Yu, L Liu, B Li, X Liu, K Ren Proceedings of the 26th Annual International Conference on Mobile Computing …, 2020 | | 2020 |
A Unified framework for randomized smoothing based certified defenses T Zheng, D Wang, B Li, J Xu | | 2019 |
InverseNet: Solving Inverse Problems of Multimedia Data with Splitting Networks Q Wei, K Fan, W Wang, T Zheng, C Amit, K Heller, C Chen, K Ren 2019 IEEE International Conference on Multimedia and Expo (ICME), 1324-1329, 2019 | | 2019 |