Seguir
Chengfang Fang
Chengfang Fang
Principal Researcher, Huawei International
Dirección de correo verificada de huawei.com
Título
Citado por
Citado por
Año
Backdoor pre-trained models can transfer to all
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
arXiv preprint arXiv:2111.00197, 2021
852021
BDPL: A boundary differentially private layer against machine learning model extraction attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
592019
Mitigating application layer distributed denial of service attacks via effective trust management
J Yu, C Fang, L Lu, Z Li
IET communications 4 (16), 1952-1962, 2010
582010
ID repetition in Kad
J Yu, C Fang, J Xu, EC Chang, Z Li
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 111-120, 2009
442009
A lightweight mechanism to mitigate application layer DDoS attacks
J Yu, C Fang, L Lu, Z Li
Scalable Information Systems: 4th International ICST Conference, INFOSCALE …, 2009
422009
PrivKVM*: Revisiting key-value statistics estimation with local differential privacy
Q Ye, H Hu, X Meng, H Zheng, K Huang, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing 20 (1), 17-35, 2021
292021
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
T Du, S Ji, L Shen, Y Zhang, J Li, J Shi, C Fang, J Yin, R Beyah, T Wang
CCS 21 (2021), 15-19, 2021
272021
Protecting decision boundary of machine learning model with differentially private perturbation
H Zheng, Q Ye, H Hu, C Fang, J Shi
IEEE Transactions on Dependable and Secure Computing 19 (3), 2007-2022, 2020
262020
An optimization model for aesthetic two-dimensional barcodes
C Fang, C Zhang, EC Chang
MultiMedia Modeling: 20th Anniversary International Conference, MMM 2014 …, 2014
202014
Differential privacy with δ-neighbourhood for spatial and dynamic datasets
C Fang, EC Chang
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
152014
Secure sketch for multiple secrets
C Fang, Q Li, EC Chang
Applied Cryptography and Network Security: 8th International Conference …, 2010
122010
Thief, beware of what get you there: Towards understanding model extraction attack
X Zhang, C Fang, J Shi
arXiv preprint arXiv:2104.05921, 2021
102021
Securing interactive sessions using mobile device through visual channel and visual inspection
C Fang, EC Chang
Proceedings of the 26th Annual Computer Security Applications Conference, 69-78, 2010
102010
Information leakage in optimal anonymized and diversified data
C Fang, EC Chang
Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008
102008
3dfed: Adaptive and extensible framework for covert backdoor attack in federated learning
H Li, Q Ye, H Hu, J Li, L Wang, C Fang, J Shi
2023 IEEE Symposium on Security and Privacy (SP), 1893-1907, 2023
92023
A goal-oriented approach for modeling and analyzing attack graph
X Liu, C Fang, D Xiao, H Xu
2010 International Conference on Information Science and Applications, 1-8, 2010
92010
Intrusion diagnosis and prediction with expert system
X Liu, C Fang, D Xiao
Security and Communication Networks 4 (12), 1483-1494, 2011
82011
System and method for verifying integrity of an electronic device
WU Yongzheng, X Wen, F Chengfang, LI Tieyan
US Patent 10,659,237, 2020
72020
Adaptive differentially private histogram of low-dimensional data
C Fang, EC Chang
International Symposium on Privacy Enhancing Technologies Symposium, 160-179, 2012
62012
Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers
J Zhang, H Fang, WJW Tann, K Xu, C Fang, EC Chang
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
52023
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20