no code implementations • 6 May 2024 • Jin Qian, Kaimin Wei, Yongdong Wu, Jilian Zhang, Jipeng Chen, Huan Bao
Recent work has demonstrated that gradient inversion attacks can exploit the gradients of FL to recreate the original user data, posing significant privacy risks.
no code implementations • 22 Apr 2024 • Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng
Then, it randomly chooses latent codes from the latent probability distribution for recovering the private data.
no code implementations • 23 Mar 2023 • Yao Chen, Shan Huang, Wensheng Gan, Gengsen Huang, Yongdong Wu
In this paper, we review some of the early advances of FL4M, which will be a research direction with unlimited development potential.
no code implementations • 27 Nov 2022 • Yao Chen, Yijie Gui, Hong Lin, Wensheng Gan, Yongdong Wu
For the purpose of advancing the research in this field, building a robust FL system, and realizing the wide application of FL, this paper sorts out the possible attacks and corresponding defenses of the current FL system systematically.
no code implementations • 27 Sep 2022 • Yao Chen, Wensheng Gan, Yongdong Wu, Philip S. Yu
Contrast pattern mining (CPM) is an important and popular subfield of data mining.
no code implementations • 9 Jun 2022 • Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen
Big data technologies such as design making, event detection, and classification are developed to help manufacturing organizations to achieve smart systems.
no code implementations • 9 Jun 2022 • Jinbao Miao, Wensheng Gan, Shicheng Wan, Yongdong Wu, Philippe Fournier-Viger
In this paper, we address this issue by proposing a novel list-based algorithm with pattern matching mechanism, named THUIM (Targeted High-Utility Itemset Mining), which can quickly match high-utility itemsets during the mining process to select the targeted patterns.