Honghui Xu
Honghui Xu
Home
Publications
Research
Teaching
Service
Accomplishments
Contact
CV
Light
Dark
Automatic
2
Privacy-Preserving Mechanisms for Multi-Label Image Recognition
Two privacy-preserving models, Privacy-Preserving Multi-label Graph Convolutional Networks (P2-ML-GCN) and Robust P2-ML-GCN (RP2-ML-GCN), are developed in this article, where differential privacy mechanism is implemented on the model’s outputs so as to defend black-box attack and avoid large aggregated noise simultaneously.
Honghui Xu 许宏辉
,
Zhipeng Cai
,
Wei Li
PDF
Cite
Code
Analysis on methods to effectively improve transfer learning performance
We thoroughly and deeply study the methods of improving transfer learning performance in order to provide the guidelines for applying transfer learning in real applications.
Honghui Xu 许宏辉
,
Wei Li
,
Zhipeng Cai
PDF
Cite
Deep Generative Models in the Industrial Internet of Things: A Survey
We review the state of the art of DGMs and their applicability to IIoT, classifying the reviewed works into the IIoT application areas of anomaly detection, trust-boundary protection, network traffic prediction, and platform monitoring.
Suparna De
,
Maria Bermudez-Edo
,
Honghui Xu 许宏辉
,
Zhipeng Cai
PDF
Cite
Efficient CityCam-to-Edge Cooperative Learning for Vehicle Counting in ITS
We propose a CityCam-to-Edge cooperative learning framework by cooperating multiple city cameras with an edge server to count vehicles more efficiently.
Honghui Xu 许宏辉
,
Zhipeng Cai
,
Ruinian Li
,
Wei Li
PDF
Cite
Code
Audio-Visual Autoencoding for Privacy-Preserving Video Streaming
We propose a cycle vector-quantized variational autoencoder (cycle-VQ-VAE) framework to encode and decode the video with its extracted audio, which takes the advantage of multiple heterogeneous data sources in the video itself to protect individuals’ privacy.
Honghui Xu 许宏辉
,
Zhipeng Cai
,
Daniel Takabi
,
Wei Li
PDF
Cite
Code
Generative Adversarial Networks: A Survey Toward Private and Secure Applications
The existing works are classified into proper categories based on privacy and security functions, and this survey conducts a comprehensive analysis of their advantages and drawbacks.
Zhipeng Cai
,
Zuobin Xiong
,
Honghui Xu 许宏辉
,
Peng Wang
,
Wei Li
,
Yi Pan
PDF
Cite
Multi-Source Adversarial Sample Attack on Autonomous Vehicles
We propose two multi-source adversarial sample attack models, including the parallel attack model and the fusion attack model to simultaneously attack the image and LiDAR perception systems in the autonomous vehicles.
Zuobin Xiong
,
Honghui Xu 许宏辉
,
Zhipeng Cai
,
Wei Li
PDF
Cite
Cite
×