Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems

    Speaker Recognition Systems (SRSs) are gradually introducing Deep Neural Networks (DNNs) as their core architecture, while attackers exploit the weakness of DNNs to launch adversarial attacks. Previous studies...

    Fangwei Wang, Ruixin Song, Qingru Li in Algorithms and Architectures for Parallel … (2024)

  2. No Access

    Chapter and Conference Paper

    An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network

    Android system is facing an increasing threat of malware. Most of the current malware detection systems need to use large-scale training samples to get high accuracy. However, it is difficult to get a lot of s...

    Qingru Li, Yufei Zhang, Fangwei Wang in Algorithms and Architectures for Parallel … (2024)

  3. No Access

    Chapter and Conference Paper

    A Label Flip** Attack on Machine Learning Model and Its Defense Mechanism

    Recently, the robustness of machine learning against data poisoning attacks is widely concerned. As a subclass of poisoning attack, the label flip** attack can poison training data resulting in reducing the ...

    Qingru Li, **nru Wang, Fangwei Wang in Algorithms and Architectures for Parallel … (2023)

  4. No Access

    Chapter and Conference Paper

    Worm Propagation Modeling and Analysis on Network

    In recent years, network worms that had a dramatic increase in the frequency and virulence of such outbreaks have become one of the major threats to the security of the Internet. This paper provides a worm pro...

    Yunkai Zhang, Fangwei Wang, Changguang Wang in Computational Intelligence and Security (2005)