Liang Tong
Cytowane przez
Cytowane przez
A hierarchical edge cloud architecture for mobile computing
L Tong, Y Li, W Gao
IEEE INFOCOM 2016, 2016
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
USENIX Security 2019, 285-302, 2019
Application-aware traffic scheduling for workload offloading in mobile clouds
L Tong, W Gao
IEEE INFOCOM 2016, 2016
Defending Against Physically Realizable Attacks on Image Classification
T Wu, L Tong, Y Vorobeychik
ICLR 2020, 2020
Adversarial Regression with Multiple Learners
L Tong, S Yu, S Alfeld, Y Vorobeychik
ICML 2018, 2018
Spectrum handoff scheme for prioritized multimedia services in cognitive radio network with finite buffer
M Li, T Jiang, L Tong
IEEE DASC 2013, 410-415, 2013
A coalitional game theoretical model for content downloading in multihop vanets
L Tong, L Ma, L Li, M Li
IEEE DASC 2013, 627-632, 2013
A framework for validating models of evasion attacks on machine learning, with application to pdf malware detection.
L Tong, B Li, C Hajaj, C Xiao, N Zhang, Y Vorobeychik
arXiv preprint arXiv:1708.08327, 2017
Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning
L Tong, A Laszka, C Yan, N Zhang, Y Vorobeychik
AAAI 2020, 2020
A cooperative-pricing-based access selection mechanism for vehicular heterogeneous networks
C Liu, S Leng, K Yang, L Tong, K Zhang
9th International Conference on Communications and Networking in China, 181-186, 2014
FACESEC: A Fine-grained Robustness Evaluation Framework for Face Recognition Systems
L Tong, Z Chen, J Ni, W Cheng, D Song, H Chen, Y Vorobeychik
CVPR 2021, 2021
Towards Deploying Robust Machine Learning Systems
L Tong
Washington University in St. Louis, 2021
Towards Robustness against Unsuspicious Adversarial Examples
L Tong, M Guo, A Prakash, Y Vorobeychik
arXiv preprint arXiv:2005.04272, 2020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–13