The following publications are possibly variants of this publication:
- Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud EnvironmentsYanjiao Chen, Xueluan Gong, Qian Wang, Xing Di, Huayang Huang. network, 34(5):141-147, 2020. [doi]
- Coordinated Backdoor Attacks against Federated Learning with Model-Dependent TriggersXueluan Gong, Yanjiao Chen, Huayang Huang, Yuqing Liao, Shuai Wang, Qian Wang 0002. network, 36(1):84-90, 2022. [doi]
- Stability-Based Analysis and Defense against Backdoor Attacks on Edge Computing ServicesYi Zhao 0011, Ke Xu, Haiyang Wang, Bo Li 0001, Ruoxi Jia. network, 35(1):163-169, 2021. [doi]
- DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical ThingsYi Ding 0003, Guozheng Wu, Dajiang Chen, Ning Zhang 0007, Linpeng Gong, Mingsheng Cao, Zhiguang Qin. iotj, 8(3):1504-1518, 2021. [doi]
- DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and DecryptionYi Ding 0003, Fuyuan Tan, Zhen Qin 0002, Mingsheng Cao, Kim-Kwang Raymond Choo, Zhiguang Qin. tnn, 33(9):4915-4929, 2022. [doi]
- Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based ApproachMeng Shen, Yawen Deng, Liehuang Zhu, Xiaojiang Du, Nadra Guizani. network, 33(5):27-33, 2019. [doi]