Dong Su
Dong Su
Alibaba Group
Zweryfikowany adres z alibaba-inc.com
Cytowane przez
Cytowane przez
Evaluating the robustness of neural networks: An extreme value theory approach
TW Weng, H Zhang, PY Chen, J Yi, D Su, Y Gao, CJ Hsieh, L Daniel
arXiv preprint arXiv:1801.10578, 2018
Is Robustness the Cost of Accuracy?--A Comprehensive Study on the Robustness of 18 Deep Image Classification Models
D Su, H Zhang, H Chen, J Yi, PY Chen, Y Gao
Proceedings of the European Conference on Computer Vision (ECCV), 631-648, 2018
On sampling, anonymization, and differential privacy or, k-anonymization meets differential privacy
N Li, W Qardaji, D Su
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
Privbasis: Frequent itemset mining with differential privacy
N Li, W Qardaji, D Su, J Cao
arXiv preprint arXiv:1208.0093, 2012
Membership privacy: A unifying framework for privacy definitions
N Li, W Qardaji, D Su, Y Wu, W Yang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Differentially private k-means clustering
D Su, J Cao, N Li, E Bertino, H Jin
Proceedings of the sixth ACM conference on data and application security and …, 2016
Provably private data anonymization: Or, k-anonymity meets differential privacy
N Li, WH Qardaji, D Su
CoRR, abs/1101.2604 49, 55, 2011
Differential privacy: From theory to practice
N Li, M Lyu, D Su, W Yang
Synthesis Lectures on Information Security, Privacy, & Trust 8 (4), 1-138, 2016
Understanding the sparse vector technique for differential privacy
M Lyu, D Su, N Li
arXiv preprint arXiv:1603.01699, 2016
Defending against neural network model stealing attacks using deceptive perturbations
T Lee, B Edwards, I Molloy, D Su
2019 IEEE Security and Privacy Workshops (SPW), 43-49, 2019
Verifiable Deep Learning Training Service
Z Gu, H Huang, J Zhang, D Su, D Pendarakis, IM Molloy
US Patent App. 16/124,657, 2020
Securing input data of deep learning inference systems via partitioned enclave execution
Z Gu, H Huang, J Zhang, D Su, A Lamba, D Pendarakis, I Molloy
arXiv preprint arXiv:1807.00969, 2018
Differentially private k-means clustering and a hybrid approach to private optimization
D Su, J Cao, N Li, E Bertino, M Lyu, H Jin
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-33, 2017
Deep Neural Network Hardening Framework
BJ Edwards, T Lee, IM Molloy, D Su
US Patent App. 15/844,442, 2019
PrivPfC: Differentially private data publication for classification
D Su, J Cao, N Li, M Lyu
The VLDB Journal 27 (2), 201-223, 2018
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
H Gunasinghe, A Kundu, E Bertino, H Krawczyk, S Chari, K Singh, D Su
The World Wide Web Conference, 594-604, 2019
Decentralized database identity management system
KK Singh, SN Chari, A Kundu, S Muppidi, D Su
US Patent 11,178,151, 2021
Paillier’s trapdoor function hides Θ (n) bits
D Su, KW Lü
Science China Information Sciences 54 (9), 1827-1836, 2011
Adversarial learning of privacy protection layers for image recognition services
BJ Edwards, H Huang, T Lee, IM Molloy, D Su
US Patent 10,535,120, 2020
Reaching data confidentiality and model accountability on the caltrain
Z Gu, H Jamjoom, D Su, H Huang, J Zhang, T Ma, D Pendarakis, I Molloy
2019 49th Annual IEEE/IFIP International Conference on Dependable Systems …, 2019
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20