


Остановите войну!
for scientists:


default search action
Ka Ho Chow
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j5]Jiajie Tan
, Hang Wu
, Ka Ho Chow
, S.-H. Gary Chan
:
Implicit Multimodal Crowdsourcing for Joint RF and Geomagnetic Fingerprinting. IEEE Trans. Mob. Comput. 22(2): 935-950 (2023) - [c20]Fatih Ilhan
, Selim Furkan Tekin
, Sihao Hu
, Tiansheng Huang
, Ka Ho Chow
, Ling Liu
:
Hierarchical Deep Neural Network Inference for Device-Edge-Cloud Systems. WWW (Companion Volume) 2023: 302-305 - [i14]Fatih Ilhan, Ling Liu, Ka Ho Chow, Wenqi Wei, Yanzhao Wu, Myungjin Lee, Ramana Kompella, Hugo Latapie, Gaowen Liu:
EENet: Learning to Early Exit for Adaptive Inference. CoRR abs/2301.07099 (2023) - [i13]Ka Ho Chow, Ling Liu, Wenqi Wei, Fatih Ilhan, Yanzhao Wu:
STDLens: Model Hijacking-Resilient Federated Learning for Object Detection. CoRR abs/2303.11511 (2023) - [i12]Wenqi Wei, Ling Liu, Jingya Zhou, Ka Ho Chow, Yanzhao Wu:
Securing Distributed SGD against Gradient Leakage Threats. CoRR abs/2305.06473 (2023) - 2022
- [j4]Mehmet Emre Gursoy
, Ling Liu, Ka Ho Chow
, Stacey Truex
, Wenqi Wei
:
An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 17: 1785-1799 (2022) - [c19]Ka Ho Chow, Umesh Deshpande, Sangeetha Seshadri, Ling Liu:
DeepRest: deep resource estimation for interactive microservices. EuroSys 2022: 181-198 - [c18]Ka Ho Chow, Ling Liu:
Boosting Object Detection Ensembles with Error Diversity. ICDM 2022: 903-908 - 2021
- [c17]Juhyun Bae, Ling Liu, Ka Ho Chow, Yanzhao Wu
, Gong Su, Arun Iyengar:
Transparent Network Memory Storage for Efficient Container Execution in Big Data Clouds. IEEE BigData 2021: 76-85 - [c16]Yanzhao Wu
, Ling Liu, Zhongwei Xie, Ka Ho Chow, Wenqi Wei:
Boosting Ensemble Accuracy by Revisiting Ensemble Diversity Metrics. CVPR 2021: 16469-16477 - [c15]Ka Ho Chow, Ling Liu:
Robust Object Detection Fusion Against Deception. KDD 2021: 2703-2713 - [c14]Ka Ho Chow, Umesh Deshpande, Sangeetha Seshadri, Ling Liu:
SRA: Smart Recovery Advisor for Cyber Attacks. SIGMOD Conference 2021: 2691-2695 - [c13]Ka Ho Chow, Ling Liu:
Perception Poisoning Attacks in Federated Learning. TPS-ISA 2021: 146-155 - [c12]Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Wenqi Wei, Ka Ho Chow:
The TSC-PFed Architecture for Privacy-Preserving FL. TPS-ISA 2021: 207-216 - 2020
- [c11]Yanzhao Wu
, Ling Liu, Zhongwei Xie, Juhyun Bae, Ka Ho Chow, Wenqi Wei:
Promoting High Diversity Ensemble Learning with EnsembleBench. CogMI 2020: 208-217 - [c10]Ka Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu
:
Understanding Object Detection Through an Adversarial Lens. ESORICS (2) 2020: 460-481 - [c9]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu
:
A Framework for Evaluating Client Privacy Leakages in Federated Learning. ESORICS (1) 2020: 545-566 - [c8]Stacey Truex, Ling Liu, Ka Ho Chow, Mehmet Emre Gursoy, Wenqi Wei:
LDP-Fed: federated learning with local differential privacy. EdgeSys@EuroSys 2020: 61-66 - [c7]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu
:
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples. ICNC 2020: 456-460 - [c6]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu
:
Adversarial Deception in Deep Learning: Analysis and Mitigation. TPS-ISA 2020: 236-245 - [c5]Ka Ho Chow, Ling Liu, Margaret Loper, Juhyun Bae, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu
:
Adversarial Objectness Gradient Attacks in Real-time Object Detection Systems. TPS-ISA 2020: 263-272 - [i11]Ka Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu:
TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems. CoRR abs/2004.04320 (2020) - [i10]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
A Framework for Evaluating Gradient Leakage Attacks in Federated Learning. CoRR abs/2004.10397 (2020) - [i9]Stacey Truex, Ling Liu, Ka Ho Chow, Mehmet Emre Gursoy, Wenqi Wei:
LDP-Fed: Federated Learning with Local Differential Privacy. CoRR abs/2006.03637 (2020) - [i8]Ka Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu:
Understanding Object Detection Through An Adversarial Lens. CoRR abs/2007.05828 (2020) - [i7]Yanzhao Wu, Ling Liu, Zhongwei Xie, Juhyun Bae, Ka Ho Chow, Wenqi Wei:
Promoting High Diversity Ensemble Learning with EnsembleBench. CoRR abs/2010.10623 (2020)
2010 – 2019
- 2019
- [j3]Ka Ho Chow
, Suining He
, Jiajie Tan, S.-H. Gary Chan
:
Efficient Locality Classification for Indoor Fingerprint-Based Systems. IEEE Trans. Mob. Comput. 18(2): 290-304 (2019) - [c4]Ka Ho Chow, Wenqi Wei, Yanzhao Wu
, Ling Liu:
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks. IEEE BigData 2019: 1282-1291 - [c3]Yanzhao Wu
, Ling Liu, Juhyun Bae, Ka Ho Chow, Arun Iyengar, Calton Pu, Wenqi Wei, Lei Yu, Qi Zhang:
Demystifying Learning Rate Policies for High Accuracy Training of Deep Neural Networks. IEEE BigData 2019: 1971-1980 - [c2]Lei Yu, Qi Zhang, Donna Dillenberger, Ling Liu, Calton Pu, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Hong Min, Arun Iyengar, Gong Su:
GRAHIES: Multi-Scale Graph Representation Learning with Latent Hierarchical Structure. CogMI 2019: 8-15 - [c1]Ling Liu, Wenqi Wei, Ka Ho Chow, Margaret Loper, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu
:
Deep Neural Network Ensembles Against Deception: Ensemble Diversity, Accuracy and Robustness. MASS 2019: 274-282 - [i6]Yifeng Zhang, Ka Ho Chow, S.-H. Gary Chan:
DA-LSTM: A Long Short-Term Memory with Depth Adaptive to Non-uniform Information Flow in Sequential Data. CoRR abs/1903.02082 (2019) - [i5]Yanzhao Wu, Ling Liu, Juhyun Bae, Ka Ho Chow, Arun Iyengar, Calton Pu, Wenqi Wei, Lei Yu, Qi Zhang:
Demystifying Learning Rate Polices for High Accuracy Training of Deep Neural Networks. CoRR abs/1908.06477 (2019) - [i4]Ka Ho Chow, Wenqi Wei, Yanzhao Wu, Ling Liu:
Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks. CoRR abs/1908.07667 (2019) - [i3]Ling Liu, Wenqi Wei, Ka Ho Chow, Margaret Loper, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness. CoRR abs/1908.11091 (2019) - [i2]Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
Cross-Layer Strategic Ensemble Defense Against Adversarial Examples. CoRR abs/1910.01742 (2019) - 2018
- [i1]Ka Ho Chow, Anish Hiranandani, Yifeng Zhang, S.-H. Gary Chan:
Representation Learning of Pedestrian Trajectories Using Actor-Critic Sequence-to-Sequence Autoencoder. CoRR abs/1811.08069 (2018) - 2014
- [j2]King Lun Choy
, Angappa Gunasekaran, Hoi Yan Lam, Ka Ho Chow, Yick Chi Tsim, Tsz Wing Ng, Ying Kei Tse, Xiao Ang Lu:
Impact of information technology on the performance of logistics industry: the case of Hong Kong and Pearl Delta region. J. Oper. Res. Soc. 65(6): 904-916 (2014)
2000 – 2009
- 2009
- [j1]King Lun Choy
, Ka Ho Chow, Ka Leung Moon, Xin Zeng, Henry C. W. Lau, Felix T. S. Chan
, George T. S. Ho:
A RFID-case-based sample management system for fashion product development. Eng. Appl. Artif. Intell. 22(6): 882-896 (2009)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-05-18 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint