Follow
Haoti Zhong
Title
Cited by
Cited by
Year
Backdoor embedding in convolutional neural network models via invisible perturbation
H Zhong, C Liao, AC Squicciarini, S Zhu, D Miller
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
340*2020
Content-Driven Detection of Cyberbullying on the Instagram Social Network
H Zhong, H Li, A Squicciarini, S Rajtmajer, C Griffin, D Miller, C Caragea
IJCAI16, 2016
2162016
T2 map signal variation predicts symptomatic osteoarthritis progression: data from the Osteoarthritis Initiative
H Zhong, DJ Miller, KL Urish
Skeletal radiology 45, 909-913, 2016
342016
A Group-Based Personalized Model for Image Privacy Classification and Labeling.
H Zhong, AC Squicciarini, DJ Miller, C Caragea
IJCAI 17, 3952-3958, 2017
322017
Toward automated multiparty privacy conflict detection
H Zhong, A Squicciarini, D Miller
Proceedings of the 27th ACM international conference on information and …, 2018
182018
From tag to protect: A tag-driven policy recommender system for image sharing
AC Squicciarini, A Novelli, D Lin, C Caragea, H Zhong
2017 15th Annual Conference on Privacy, Security and Trust (PST), 337-33709, 2017
172017
Flexible inference for cyberbully incident detection
H Zhong, DJ Miller, A Squicciarini
Machine Learning and Knowledge Discovery in Databases: European Conference …, 2019
142019
Server-based manipulation attacks against machine learning models
C Liao, H Zhong, S Zhu, A Squicciarini
Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018
112018
Toward image privacy classification and spatial attribution of private content
H Zhong, H Li, A Squicciarini, S Rajtmajer, D Miller
2019 IEEE International Conference on Big Data (Big Data), 1351-1360, 2019
32019
User protection in social networks using machine learning techniques
H Zhong
The Pennsylvania State University, 2019
12019
The system can't perform the operation now. Try again later.
Articles 1–10