no code implementations • 14 Jun 2019 • Ziqi Yang, Hung Dang, Ee-Chien Chang
In this paper, we show that distillation, a widely used transformation technique, is a quite effective attack to remove watermark embedded by existing algorithms.
3 code implementations • 2 Apr 2018 • Hung Dang, Tien Tuan Anh Dinh, Dumitrel Loghin, Ee-Chien Chang, Qian Lin, Beng Chin Ooi
In this work, we take a principled approach to apply sharding, which is a well-studied and proven technique to scale out databases, to blockchain systems in order to improve their transaction throughput at scale.
Distributed, Parallel, and Cluster Computing Cryptography and Security Databases
no code implementations • 13 Feb 2018 • Jiyi Zhang, Hung Dang, Hwee Kuan Lee, Ee-Chien Chang
We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse mapping" that encodes a data sample into a latent code vector.