default search action
Mingyi Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c6]Jing Wu, Munawar Hayat, Mingyi Zhou, Mehrtash Harandi:
Concealing Sensitive Samples against Gradient Leakage in Federated Learning. AAAI 2024: 21717-21725 - [c5]Mingyi Zhou, Xiang Gao, Jing Wu, Kui Liu, Hailong Sun, Li Li:
Investigating White-Box Attacks for On-Device Models. ICSE 2024: 152:1-152:12 - [c4]Mingyi Zhou, Xiang Gao, Pei Liu, John Grundy, Chunyang Chen, Xiao Chen, Li Li:
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models. ISSTA 2024: 174-185 - [d1]Mingyi Zhou, Xiang Gao, Pei Liu, John Grundy, Chunyang Chen, Xiao Chen, Li Li:
CustomDLCoder: Generating Pure Code Implementations to Replace On-Device DL Models. Zenodo, 2024 - [i11]Mingyi Zhou, Xiang Gao, Jing Wu, Kui Liu, Hailong Sun, Li Li:
Investigating White-Box Attacks for On-Device Models. CoRR abs/2402.05493 (2024) - [i10]Mingyi Zhou, Xiang Gao, Pei Liu, John C. Grundy, Chunyang Chen, Xiao Chen, Li Li:
Model-less Is the Best Model: Generating Pure Code Implementations to Replace On-Device DL Models. CoRR abs/2403.16479 (2024) - [i9]Daihang Chen, Yonghui Liu, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Shuai Wang, Xiao Chen, Tegawendé F. Bissyandé, Jacques Klein, Li Li:
LLM for Mobile: An Initial Roadmap. CoRR abs/2407.06573 (2024) - [i8]Zhihao Lin, Wei Ma, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Yang Liu, Jun Wang, Li Li:
PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach. CoRR abs/2409.14177 (2024) - 2023
- [c3]Mingyi Zhou, Xiang Gao, Jing Wu, John C. Grundy, Xiao Chen, Chunyang Chen, Li Li:
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-Based Systems. ISSTA 2023: 1005-1017 - [i7]Mingyi Zhou, Xiang Gao, Jing Wu, John Grundy, Xiao Chen, Chunyang Chen, Li Li:
ModelObfuscator: Obfuscating Model Information to Protect Deployed ML-based Systems. CoRR abs/2306.06112 (2023) - 2022
- [j6]Jiawei Liu, Huijie Fan, Qiang Wang, Wentao Li, Yandong Tang, Danbo Wang, Mingyi Zhou, Li Chen:
Local Label Point Correction for Edge Detection of Overlapping Cervical Cells. Frontiers Neuroinformatics 16: 895290 (2022) - [i6]Jing Wu, Munawar Hayat, Mingyi Zhou, Mehrtash Harandi:
Defense against Privacy Leakage in Federated Learning. CoRR abs/2209.05724 (2022) - 2021
- [j5]Shuai Wang, Mingyi Zhou, Qianlai Zhuang, Liping Guo:
Prediction Potential of Remote Sensing-Related Variables in the Topsoil Organic Carbon Density of Liaohekou Coastal Wetlands, Northeast China. Remote. Sens. 13(20): 4106 (2021) - [c2]Hengling Zhao, Chih-Chien Tsai, Ce Zhu, Mingyi Zhou, Jiun-Jie Wang, Yipeng Liu:
Deep Learning-Based Regional Sub-models Integration for Parkinson's Disease Diagnosis Using Diffusion Tensor Imaging. ICIG (2) 2021: 742-753 - [i5]Jing Wu, Mingyi Zhou, Ce Zhu, Yipeng Liu, Mehrtash Harandi, Li Li:
Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions. CoRR abs/2104.11103 (2021) - 2020
- [c1]Mingyi Zhou, Jing Wu, Yipeng Liu, Shuaicheng Liu, Ce Zhu:
DaST: Data-Free Substitute Training for Adversarial Attacks. CVPR 2020: 231-240 - [i4]Mingyi Zhou, Jing Wu, Yipeng Liu, Shuaicheng Liu, Ce Zhu:
DaST: Data-free Substitute Training for Adversarial Attacks. CoRR abs/2003.12703 (2020) - [i3]Mingyi Zhou, Jing Wu, Yipeng Liu, Xiaolin Huang, Shuaicheng Liu, Xiang Zhang, Ce Zhu:
Adversarial Imitation Attack. CoRR abs/2003.12760 (2020) - [i2]Jing Wu, Xiang Zhang, Mingyi Zhou, Ce Zhu:
ProbaNet: Proposal-balanced Network for Object Detection. CoRR abs/2005.02699 (2020) - [i1]Jing Wu, Mingyi Zhou, Shuaicheng Liu, Yipeng Liu, Ce Zhu:
Decision-based Universal Adversarial Attack. CoRR abs/2009.07024 (2020)
2010 – 2019
- 2019
- [j4]Liaqat Ali, Atiqur Rahman, Aurangzeb Khan, Mingyi Zhou, Ashir Javeed, Javed Ali Khan:
An Automated Diagnostic System for Heart Disease Prediction Based on χ2 Statistical Model and Optimally Configured Deep Neural Network. IEEE Access 7: 34938-34945 (2019) - [j3]Liaqat Ali, Ce Zhu, Noorbakhsh Amiri Golilarz, Ashir Javeed, Mingyi Zhou, Yipeng Liu:
Reliable Parkinson's Disease Detection by Analyzing Handwritten Drawings: Construction of an Unbiased Cascaded Learning System Based on Feature Selection and Adaptive Boosting Model. IEEE Access 7: 116480-116489 (2019) - [j2]Liaqat Ali, Ce Zhu, Mingyi Zhou, Yipeng Liu:
Early diagnosis of Parkinson's disease from multiple voice recordings by simultaneous sample and feature selection. Expert Syst. Appl. 137: 22-28 (2019) - [j1]Mingyi Zhou, Yipeng Liu, Zhen Long, Longxi Chen, Ce Zhu:
Tensor rank learning in CP decomposition via convolutional neural network. Signal Process. Image Commun. 73: 12-21 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint