default search action
Hongsheng Hu
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Hongsheng Hu, Yunhe Meng, Shipei Huang:
H∞ security control for 2-D switched time delay systems under arbitrary delay time-variation rate and stochastic cyber attacks. J. Frankl. Inst. 361(18): 107290 (2024) - [j10]Hongsheng Hu, Xuyun Zhang, Zoran Salcic, Lichao Sun, Kim-Kwang Raymond Choo, Gillian Dobbie:
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(4): 3012-3029 (2024) - [j9]Hongsheng Hu, Jingyuan Su, Fengwei Chen, Yue Sun:
Modularized Inductive Power Transfer Systems With Inherent Impedance Decoupling for High-Power Applications. IEEE Trans. Ind. Electron. 71(2): 1492-1502 (2024) - [c16]Di Zhao, Yun Sing Koh, Gillian Dobbie, Hongsheng Hu, Philippe Fournier-Viger:
Symmetric Self-Paced Learning for Domain Generalization. AAAI 2024: 16961-16969 - [c15]Xiaoxiao Chi, Xuyun Zhang, Yan Wang, Lianyong Qi, Amin Beheshti, Xiaolong Xu, Kim-Kwang Raymond Choo, Shuo Wang, Hongsheng Hu:
Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought. IJCAI 2024: 5781-5789 - [c14]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. NDSS 2024 - [c13]Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Minhui Xue:
LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs. SP 2024: 2977-2995 - [c12]Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue:
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. SP 2024: 3257-3275 - [c11]Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue:
DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts. USENIX Security Symposium 2024 - [c10]Nan Wu, Xin Yuan, Shuo Wang, Hongsheng Hu, Minhui Xue:
Cardinality Counting in "Alcatraz": A Privacy-aware Federated Learning Approach. WWW 2024: 3076-3084 - [i10]Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue:
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. CoRR abs/2404.03233 (2024) - [i9]Xiaoxiao Chi, Xuyun Zhang, Yan Wang, Lianyong Qi, Amin Beheshti, Xiaolong Xu, Kim-Kwang Raymond Choo, Shuo Wang, Hongsheng Hu:
Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought. CoRR abs/2405.07018 (2024) - [i8]Binhao Ma, Tianhang Zheng, Hongsheng Hu, Di Wang, Shuo Wang, Zhongjie Ba, Zhan Qin, Kui Ren:
Releasing Malevolence from Benevolence: The Menace of Benign Data on Machine Unlearning. CoRR abs/2407.05112 (2024) - 2023
- [j8]Hongsheng Hu, Gillian Dobbie, Zoran Salcic, Meng Liu, Jianbing Zhang, Lingjuan Lyu, Xuyun Zhang:
Differentially private locality sensitive hashing based federated recommender system. Concurr. Comput. Pract. Exp. 35(14) (2023) - [c9]Zhibo Jin, Zhiyu Zhu, Hongsheng Hu, Minhui Xue, Huaming Chen:
POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models. AsiaCCS 2023: 1031-1033 - [c8]Haolong Xiang, Xuyun Zhang, Hongsheng Hu, Lianyong Qi, Wanchun Dou, Mark Dras, Amin Beheshti, Xiaolong Xu:
OptIForest: Optimal Isolation Forest for Anomaly Detection. IJCAI 2023: 2379-2387 - [i7]Yixin Liu, Hongsheng Hu, Xuyun Zhang, Lichao Sun:
Watermarking Text Data on Large Language Models for Dataset Copyright Protection. CoRR abs/2305.13257 (2023) - [i6]Haolong Xiang, Xuyun Zhang, Hongsheng Hu, Lianyong Qi, Wanchun Dou, Mark Dras, Amin Beheshti, Xiaolong Xu:
OptIForest: Optimal Isolation Forest for Anomaly Detection. CoRR abs/2306.12703 (2023) - [i5]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. CoRR abs/2309.08230 (2023) - [i4]Hongsheng Hu, Xuyun Zhang, Zoran Salcic, Lichao Sun, Kim-Kwang Raymond Choo, Gillian Dobbie:
Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning. CoRR abs/2310.00222 (2023) - 2022
- [j7]Hongsheng Hu, Zoran Salcic, Lichao Sun, Gillian Dobbie, Philip S. Yu, Xuyun Zhang:
Membership Inference Attacks on Machine Learning: A Survey. ACM Comput. Surv. 54(11s): 235:1-235:37 (2022) - [j6]Qiyun Zhang, Xuyun Zhang, Hongsheng Hu, Caizhong Li, Yinping Lin, Rui Ma:
Sports match prediction model for training and exercise using attention-based LSTM network. Digit. Commun. Networks 8(4): 508-515 (2022) - [j5]Hongsheng Hu, Shipei Huang, Hui Wu:
Finite-time event-triggered control for switched affine systems with time-varying delay under state-dependent switching. Int. J. Syst. Sci. 53(6): 1317-1333 (2022) - [j4]Hongsheng Hu, Shanxu Duan, Tao Cai, Pingkang Zheng:
A Current-Sharing Compensation Method for High-Power-Medium-Frequency Coils Composed of Multiple Branches Connected in Parallel. IEEE Trans. Ind. Electron. 69(5): 4637-4651 (2022) - [c7]Haolong Xiang, Hongsheng Hu, Xuyun Zhang:
DeepiForest: A Deep Anomaly Detection Framework with Hashing Based Isolation Forest. ICDM 2022: 1251-1256 - [c6]Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang:
Membership Inference via Backdooring. IJCAI 2022: 3832-3838 - [i3]Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang:
Membership Inference via Backdooring. CoRR abs/2206.04823 (2022) - 2021
- [j3]Meng Liu, Hongsheng Hu, Haolong Xiang, Chi Yang, Lingjuan Lyu, Xuyun Zhang:
Clustering-based Efficient Privacy-preserving Face Recognition Scheme without Compromising Accuracy. ACM Trans. Sens. Networks 17(3): 31:1-31:27 (2021) - [c5]Hongsheng Hu, Zoran Salcic, Lichao Sun, Gillian Dobbie, Xuyun Zhang:
Source Inference Attacks in Federated Learning. ICDM 2021: 1102-1107 - [c4]Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Yi Chen, Xuyun Zhang:
EAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks. IJCNN 2021: 1-8 - [i2]Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Xuyun Zhang:
Membership Inference Attacks on Machine Learning: A Survey. CoRR abs/2103.07853 (2021) - [i1]Hongsheng Hu, Zoran Salcic, Lichao Sun, Gillian Dobbie, Xuyun Zhang:
Source Inference Attacks in Federated Learning. CoRR abs/2109.05659 (2021) - 2020
- [c3]Hongsheng Hu, Gillian Dobbie, Zoran Salcic, Meng Liu, Jianbing Zhang, Xuyun Zhang:
A Locality Sensitive Hashing Based Approach for Federated Recommender System. CCGRID 2020: 836-842
2010 – 2019
- 2019
- [j2]Xiaoming Zhang, Tao Cai, Shanxu Duan, Hao Feng, Hongsheng Hu, Jintao Niu, Changsong Chen:
A Control Strategy for Efficiency Optimization and Wide ZVS Operation Range in Bidirectional Inductive Power Transfer System. IEEE Trans. Ind. Electron. 66(8): 5958-5969 (2019) - 2018
- [j1]Hao Feng, Tao Cai, Shanxu Duan, Xiaoming Zhang, Hongsheng Hu, Jintao Niu:
A Dual-Side-Detuned Series-Series Compensated Resonant Converter for Wide Charging Region in a Wireless Power Transfer System. IEEE Trans. Ind. Electron. 65(3): 2177-2188 (2018) - 2010
- [c2]Hongsheng Hu, Liang Cui, Jiong Wang:
Control system design and performance test of a magnetorheological fluid fan clutch. ICCA 2010: 1409-1413
2000 – 2009
- 2008
- [c1]Hongsheng Hu, Suxiang Qian, Jiong Wang, Zhaochun Li:
Performance simulation and experimental evaluation for a magnet-rheological damper under impact load. ROBIO 2008: 1538-1543
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint