Backdoor embedding in convolutional neural network models via invisible perturbation H Zhong, C Liao, AC Squicciarini, S Zhu, D Miller Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 357* | 2020 |
Content-Driven Detection of Cyberbullying on the Instagram Social Network H Zhong, H Li, A Squicciarini, S Rajtmajer, C Griffin, D Miller, C Caragea IJCAI16, 2016 | 219 | 2016 |
T2 map signal variation predicts symptomatic osteoarthritis progression: data from the Osteoarthritis Initiative H Zhong, DJ Miller, KL Urish Skeletal radiology 45, 909-913, 2016 | 37 | 2016 |
A Group-Based Personalized Model for Image Privacy Classification and Labeling. H Zhong, AC Squicciarini, DJ Miller, C Caragea IJCAI 17, 3952-3958, 2017 | 33 | 2017 |
Toward automated multiparty privacy conflict detection H Zhong, A Squicciarini, D Miller Proceedings of the 27th ACM international conference on information and …, 2018 | 18 | 2018 |
From tag to protect: A tag-driven policy recommender system for image sharing AC Squicciarini, A Novelli, D Lin, C Caragea, H Zhong 2017 15th Annual Conference on Privacy, Security and Trust (PST), 337-33709, 2017 | 17 | 2017 |
Flexible inference for cyberbully incident detection H Zhong, DJ Miller, A Squicciarini Machine Learning and Knowledge Discovery in Databases: European Conference …, 2019 | 14 | 2019 |
Server-based manipulation attacks against machine learning models C Liao, H Zhong, S Zhu, A Squicciarini Proceedings of the Eighth ACM Conference on Data and Application Security …, 2018 | 11 | 2018 |
Toward image privacy classification and spatial attribution of private content H Zhong, H Li, A Squicciarini, S Rajtmajer, D Miller 2019 IEEE International Conference on Big Data (Big Data), 1351-1360, 2019 | 3 | 2019 |
User protection in social networks using machine learning techniques H Zhong The Pennsylvania State University, 2019 | 1 | 2019 |