基本信息
浏览量:138
职业迁徙
个人简介
Research Interests
1. Trustworthy AI: adversarial/poison attacks and defenses of ML/DL, privacy attacks and defenses of ML/DL, IP protection of ML/DL models
2. Applied Cryptography: differential privacy, privacy-preserving computation outsourcing, access control, cloud/edge/IoT-related multiparty computation
3. Multimedia Coding and Security: watermarking/data hiding, design/cryptanalysis of multimedia cryptosystems, selective/perceptual encryption, joint compression-encryption
1. Trustworthy AI: adversarial/poison attacks and defenses of ML/DL, privacy attacks and defenses of ML/DL, IP protection of ML/DL models
2. Applied Cryptography: differential privacy, privacy-preserving computation outsourcing, access control, cloud/edge/IoT-related multiparty computation
3. Multimedia Coding and Security: watermarking/data hiding, design/cryptanalysis of multimedia cryptosystems, selective/perceptual encryption, joint compression-encryption
研究兴趣
论文共 169 篇作者统计合作学者相似作者
按年份排序按引用量排序主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
Hangtao Zhang,Shengshan Hu, Yichen Wang,Leo Yu Zhang,Ziqi Zhou, Xianlong Wang,Yanjun Zhang,Chao Chen
arxiv(2024)
引用0浏览0引用
0
0
IEEE Transactions on Artificial Intelligenceno. 99 (2024): 1-11
IEEE Transactions on Computational Social Systemsno. 99 (2024): 1-18
Computer Standards & Interfacespp.103854, (2024)
IEEE Transactions on Dependable and Secure Computingno. 99 (2024): 1-13
AAAI 2024no. 18 (2024): 19823-19831
IEEE Transactions on Information Forensics and Securityno. 99 (2024): 1-1
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2024): 1241-1250
加载更多
作者统计
合作学者
合作机构
D-Core
- 合作者
- 学生
- 导师
数据免责声明
页面数据均来自互联网公开来源、合作出版商和通过AI技术自动分析结果,我们不对页面数据的有效性、准确性、正确性、可靠性、完整性和及时性做出任何承诺和保证。若有疑问,可以通过电子邮件方式联系我们:report@aminer.cn