Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Searching for Textual Adversarial Examples with Learned Strategy

    Adversarial attacks can help to reveal the vulnerability of neural networks. In the text classification domain, synonym replacement is an effective way to generate adversarial examples. However, the number of ...

    **angzhe Guo, Ruidan Su, Shikui Tu, Lei Xu in Neural Information Processing (2023)

  2. Article

    Data-Driven Granular Computing Systems and Applications

    Ruidan Su, George Panoutsos, **aodong Yue in Granular Computing (2021)

  3. No Access

    Chapter and Conference Paper

    Design and Implementation of a Parallel Crypto Server

    As demands for secure communication bandwidth grow, efficient processing of cryptographic server at the host has become a constraint that prevents the achievement of acceptable secure services at large e-comme...

    **aofeng Rong, **aojuan Gao, Ruidan Su in Computational Intelligence and Security (2005)