Search Results - "ZHANG Fangjiao"

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning by Zhang, Jianyi, Zhang, Fangjiao, Jin, Qichao, Wang, Zhiqiang, Lin, Xiaodong, Hei, Xiali

    Published in Digital communications and networks (01-08-2024)
    “…Federated Learning (FL), a burgeoning technology, has received increasing attention due to its privacy protection capability. However, the base algorithm…”
    Get full text
    Journal Article
  2. 2

    Dissecting zero trust: research landscape and its implementation in IoT by Liu, Chunwen, Tan, Ru, Wu, Yang, Feng, Yun, Jin, Ze, Zhang, Fangjiao, Liu, Yuling, Liu, Qixu

    Published in Cybersecurity (Singapore) (01-12-2024)
    “…As a progressive security strategy, the zero trust model has attracted notable attention and importance within the realm of network security, especially in the…”
    Get full text
    Journal Article
  3. 3

    EVFeX: An efficient vertical federated XGBoost algorithm based on optimized secure matrix multiplication by Zhang, Fangjiao, Wang, Li, Cui, Chang, Meng, Qingshu, Yang, Min

    Published in Signal processing (01-02-2025)
    “…Federated Learning is a distributed machine learning paradigm that enables multiple participants to collaboratively train models without compromising the…”
    Get full text
    Journal Article
  4. 4

    SLBot: A Serverless Botnet Based on Service Flux by Di Wu, Binxing Fang, Jie Yin, Fangjiao Zhang, Xiang Cui

    “…Today, botnet continue to be a significant threat to Internet, and is still responsible for most large scale cyber-attacks. An obvious strategy for preventing…”
    Get full text
    Conference Proceeding
  5. 5

    Secure vertical federated learning based on feature disentanglement by Zhang, Fangjiao, Li, Guoqiang, Suo, Zhufeng, Wang, Li, Cui, Chang, Meng, Qingshu

    Published in Signal processing (01-10-2023)
    “…•A new vertical federated learning framework (SVFL) preventing label owner from label inference attack.•A feature disentanglement based method to prevent…”
    Get full text
    Journal Article
  6. 6

    Survey of industrial Internet traffic analysis technology by LIU Qixu, XIAO Juxin, TAN Yaokang, WANG Chengchun, HUANG Hao, ZHANG Fangjiao, YIN Jie, LIU Yuling

    Published in Tongxin Xuebao (01-08-2024)
    “…To gain an in-depth awareness of the application of traffic analysis technology in the industrial Internet, the differences between the industrial Internet and…”
    Get full text
    Journal Article
  7. 7

    XMAM:X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning by Zhang, Jianyi, Zhang, Fangjiao, Jin, Qichao, Wang, Zhiqiang, Lin, Xiaodong, Hei, Xiali

    Published 27-12-2022
    “…Federated Learning (FL) has received increasing attention due to its privacy protection capability. However, the base algorithm FedAvg is vulnerable when it…”
    Get full text
    Journal Article
  8. 8

    A Systematic Study of AI Applications in Cybersecurity Competitions by Zhang, Fangjiao, Cui, Xiang, Wang, Zhi, Chen, Shaomian, Liu, Qixu, Liu, Chaoge

    “…With more and more advanced persistent threats and other advanced attacks emerging, the cybersecurity situation becomes complicated and grim. Owing to its…”
    Get full text
    Conference Proceeding