CHUNSHENG XIN
Old Dominion University
H-index: 32
North America-United States
Top articles of CHUNSHENG XIN
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
From Individual Computation to Allied Optimization: Remodeling Privacy-Preserving Neural Inference with Function Input Tuning | Qiao Zhang Tao Xiang Chunsheng Xin Hongyi Wu | 2024/2/1 | |
Sub-Band Backdoor Attack in Remote Sensing Imagery | Algorithms | Kazi Aminul Islam Hongyi Wu Chunsheng Xin Rui Ning Liuwan Zhu | 2024/4/28 |
United We Stand: Accelerating Privacy-Preserving Neural Inference by Conjunctive Optimization with Interleaved Nexus | Proceedings of the AAAI Conference on Artificial Intelligence | Qiao Zhang Tao Xiang Chunsheng Xin Hongyi Wu | 2024/3/24 |
PT-SSIM: A Proactive, Trustworthy Self-Sovereign Identity Management System. | IEEE Internet of Things Journal | Efat Samir Fathalla Mohamed Azab ChunSheng Xin Hongyi Wu | 2023/5/8 |
PRISC: Privacy-Preserved Pandemic Infection Risk Computation through Cellular Enabled IoT Devices | IEEE Internet of Things Journal | Yizhou Feng Qiao Zhang Hongyi Wu Chunsheng Xin | 2023/4/5 |
Efficient Backdoor Mitigation in Federated Learning with Contrastive Loss | Hal Ferguson Rui Ning Jiang Li Hongyi Wu Chunsheng Xin | 2023/10/13 | |
View Synthesis with Scene Recognition for Cross-View Image Localization | Future Internet | Uddom Lee Peng Jiang Hongyi Wu Chunsheng Xin | 2023/3/28 |
Certified Copy: A Resistant Backdoor Attack | Omid Rajabi Rostami Rui Ning Chunsheng Xin Jin-Hee Cho Jiang Li | 2023/10/13 | |
SEEK: Detecting GPS Spoofing via a Sequential Dashcam-Based Vehicle Localization Framework | Peng Jiang Hongyi Wu Yanxiao Zhao Dan Zhao Chunsheng Xin | 2023/3/13 | |
Beam Profiling and Beamforming Modeling for mmWave NextG Networks | Efat Samir Fathalla Sahar Zargarzadeh Chunsheng Xin Hongyi Wu Peng Jiang | 2023/7/24 | |
Editorial | Public Sciences & Policies | Pedro G Rodrigues Maria João Bárrios Feliciano Villar | 2020 |
ScanFed: Scalable Behavior-Based Backdoor Detection in Federated Learning | Rui Ning Jiang Li Chunsheng Xin Chonggang Wang Xu Li | 2023/7/18 | |
A channel state information based virtual MAC spoofing detector | High-Confidence Computing | Peng Jiang Hongyi Wu Chunsheng Xin | 2022/9/1 |
Light auditor: power measurement can tell private data leakage through iot covert channels | Woosub Jung Kailai Cui Kenneth Koltermann Junjie Wang ChunSheng Xin | 2022/11/6 | |
Trojanflow: A neural backdoor attack to deep learning-based network traffic classifiers | Rui Ning Chunsheng Xin Hongyi Wu | 2022/5/2 | |
Wideband spectrum sensing in cognitive radio networks | Prosanta Paul ChunSheng Xin Min Song Yanxiao Zhao | 2022/9/1 | |
Most and Least Retrievable Images in Visual-Language Query Systems | Liuwan Zhu Rui Ning Jiang Li Chunsheng Xin Hongyi Wu | 2022/10/22 | |
Hibernated backdoor: A mutual information empowered backdoor attack to deep neural networks | Proceedings of the AAAI Conference on Artificial Intelligence | Rui Ning Jiang Li Chunsheng Xin Hongyi Wu Chonggang Wang | 2022/6/28 |
DeepPOSE: Detecting GPS spoofing attack via deep recurrent neural network | Digital Communications and Networks | Peng Jiang Hongyi Wu Chunsheng Xin | 2022/10/1 |
Hunter: HE-friendly structured pruning for efficient privacy-preserving deep learning | Yifei Cai Qiao Zhang Rui Ning Chunsheng Xin Hongyi Wu | 2022/5/30 |