Adversarial Attacks against Network Intrusion Detection in IoT Systems H Qiu, T Dong, T Zhang, J Lu, G Memmi, M Qiu IEEE Internet of Things Journal 8 (13), 10327-10335, 2020 | 276 | 2020 |
Secure health data sharing for medical cyber-physical systems for the healthcare 4.0 H Qiu, M Qiu, M Liu, G Memmi IEEE journal of biomedical and health informatics 24 (9), 2499-2505, 2020 | 240 | 2020 |
DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation H Qiu, Y Zeng, S Guo, T Zhang, M Qiu, B Thuraisingham The 16th ACM ASIA Conference on Computer and Communications Security (ACM …, 2021 | 224* | 2021 |
Topological Graph Convolutional Network-Based Urban Traffic Flow and Density Prediction H Qiu, Q Zheng, M Msahli, G Memmi, M Qiu, J Lu IEEE Transactions on Intelligent Transportation Systems, 2020 | 189 | 2020 |
Selective encryption on ECG data in body sensor network based on supervised machine learning H Qiu, M Qiu, Z Lu Information Fusion 55, 59-67, 2020 | 154 | 2020 |
Deep residual learning-based enhanced JPEG compression in the Internet of Things H Qiu, Q Zheng, G Memmi, J Lu, M Qiu, B Thuraisingham IEEE Transactions on Industrial Informatics 17 (3), 2124-2133, 2020 | 147 | 2020 |
Secure V2X Communication Network based on Intelligent PKI and Edge Computing H Qiu, M Qiu, L Ruqian IEEE Network 34 (2), 172-178, 2020 | 143 | 2020 |
A dynamic scalable blockchain based communication architecture for IoT H Qiu, M Qiu, G Memmi, Z Ming, M Liu Smart Blockchain: First International Conference, SmartBlock 2018, Tokyo …, 2018 | 138 | 2018 |
A User-centric Data Protection Method for Cloud Storage based on Invertible DWT H Qiu, H Noura, M Qiu, Z Ming, G Memmi IEEE Transactions on Cloud Computing 9 (4), 1293 - 1304, 2021 | 135 | 2021 |
Jtrans: Jump-aware transformer for binary code similarity detection H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu, J Zhuge, C Zhang Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 102* | 2022 |
Review on image processing based adversarial example defenses in computer vision M Qiu, H Qiu 2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2020 | 95 | 2020 |
A data augmentation-based defense method against adversarial attacks in neural networks Y Zeng, H Qiu, G Memmi, M Qiu Algorithms and Architectures for Parallel Processing: 20th International …, 2020 | 76 | 2020 |
Towards Secure and Efficient Deep Learning Inference in Dependable IoT Systems H Qiu, Q Zheng, T Zhang, M Qiu, G Memmi, J Lu IEEE Internet of Things Journal 8 (5), 3180-3188, 2020 | 69 | 2020 |
Interpreting Deep Learning Models in Natural Language Processing: A Review X Sun, D Yang, X Li, T Zhang, Y Meng, H Qiu, G Wang, E Hovy, J Li arXiv preprint arXiv:2110.10470, 2021 | 63 | 2021 |
All-Or-Nothing data protection for ubiquitous communication: challenges and perspectives H Qiu, K Kapusta, Z Lu, M Qiu, G Memmi Information Sciences 502, 434-445, 2019 | 61 | 2019 |
An Efficient Key Distribution System for Data Fusion in V2X Heterogeneous Networks H Qiu, M Qiu, L Zhihui, G Memmi Information Fusion 50, 212-220, 2019 | 59 | 2019 |
Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models S Guo, T Zhang, H Qiu, Y Zeng, T Xiang, Y Liu International Joint Conference on Artificial Intelligence (IJCAI), 2021, 2021 | 55* | 2021 |
Privacy-preserving Collaborative Learning with Automatic Transformation Search W Gao, S Guo, T Zhang, H Qiu, Y Wen, Y Liu IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2021, 2021 | 55 | 2021 |
System Log Parsing: A Survey T Zhang, H Qiu, G Castellano, M Rifai, CS Chen, F Pianese IEEE Transactions on Knowledge and Data Engineering, 2023 | 49 | 2023 |
An efficient preprocessing-based approach to mitigate advanced adversarial attacks H Qiu, Y Zeng, Q Zheng, S Guo, T Zhang, H Li IEEE Transactions on Computers, 2021 | 43* | 2021 |