A comprehensive survey on imputation of missing data in internet of things D Adhikari, W Jiang, J Zhan, Z He, DB Rawat, U Aickelin, HA Khorshidi ACM Computing Surveys 55 (7), 1-38, 2022 | 54 | 2022 |
Optimized co-scheduling of mixed-precision neural network accelerator for real-time multitasking applications W Jiang, Z Song, J Zhan, Z He, X Wen, K Jiang Journal of Systems Architecture 110, 101775, 2020 | 43 | 2020 |
Attack-aware detection and defense to resist adversarial examples W Jiang, Z He, J Zhan, W Pan IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020 | 20 | 2020 |
Research progress and challenges on application-driven adversarial examples: A survey W Jiang, Z He, J Zhan, W Pan, D Adhikari ACM Transactions on Cyber-Physical Systems (TCPS) 5 (4), 1-25, 2021 | 17 | 2021 |
A low-cost image encryption method to prevent model stealing of deep neural network W Jiang, Z Gong, J Zhan, Z He, W Pan Journal of Circuits, Systems and Computers 29 (16), 2050252, 2020 | 10 | 2020 |
Be Your Own Neighborhood: Detecting Adversarial Examples by the Neighborhood Relations Built on Self-Supervised Learning Z He, Y Yang, PY Chen, Q Xu, TY Ho Forty-first International Conference on Machine Learning, 2022 | 5 | 2022 |
Interpretability Derived Backdoor Attacks Detection in Deep Neural Networks: Work-in-Progress X Wen, W Jiang, J Zhan, X Wang, Z He 2020 International Conference on Embedded Software (EMSOFT), 13-14, 2020 | 1 | 2020 |
RIGID: A Training-free and Model-Agnostic Framework for Robust AI-Generated Image Detection Z He, PY Chen, TY Ho arXiv preprint arXiv:2405.20112, 2024 | | 2024 |
Heatmap-Aware Low-Cost Design to Resist Adversarial Attacks: Work-in-Progress Z He, W Jiang, J Zhan, X Wang, X Wen 2020 International Conference on Hardware/Software Codesign and System …, 2020 | | 2020 |