Ka Ho Chow

Orcid: 0000-0001-5917-2577

According to our database1, Ka Ho Chow authored at least 40 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hierarchical Pruning of Deep Ensembles with Focal Diversity.
ACM Trans. Intell. Syst. Technol., February, 2024

Demystifying Data Poisoning Attacks in Distributed Learning as a Service.
IEEE Trans. Serv. Comput., 2024

Imperio: Language-Guided Backdoor Attacks for Arbitrary Model Control.
CoRR, 2024

2023
Securing Distributed SGD Against Gradient Leakage Threats.
IEEE Trans. Parallel Distributed Syst., July, 2023

Implicit Multimodal Crowdsourcing for Joint RF and Geomagnetic Fingerprinting.
IEEE Trans. Mob. Comput., 2023

Atlas: Hybrid Cloud Migration Advisor for Interactive Microservices.
CoRR, 2023

EENet: Learning to Early Exit for Adaptive Inference.
CoRR, 2023

Hierarchical Deep Neural Network Inference for Device-Edge-Cloud Systems.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

SCAD: Scalability Advisor for Interactive Microservices on Hybrid Clouds.
Proceedings of the Companion of the 2023 International Conference on Management of Data, 2023

Lockdown: Backdoor Defense for Federated Learning with Isolated Subspace Training.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Exploring Model Learning Heterogeneity for Boosting Ensemble Robustness.
Proceedings of the IEEE International Conference on Data Mining, 2023

STDLens: Model Hijacking-Resilient Federated Learning for Object Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
An Adversarial Approach to Protocol Analysis and Selection in Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022

Boosting Object Detection Ensembles with Error Diversity.
Proceedings of the IEEE International Conference on Data Mining, 2022

DeepRest: deep resource estimation for interactive microservices.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

2021
The TSC-PFed Architecture for Privacy-Preserving FL.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Perception Poisoning Attacks in Federated Learning.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

SRA: Smart Recovery Advisor for Cyber Attacks.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Robust Object Detection Fusion Against Deception.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

Boosting Ensemble Accuracy by Revisiting Ensemble Diversity Metrics.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

Transparent Network Memory Storage for Efficient Container Execution in Big Data Clouds.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
A Framework for Evaluating Gradient Leakage Attacks in Federated Learning.
CoRR, 2020

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems.
CoRR, 2020

Adversarial Deception in Deep Learning: Analysis and Mitigation.
Proceedings of the Second IEEE International Conference on Trust, 2020

Adversarial Objectness Gradient Attacks in Real-time Object Detection Systems.
Proceedings of the Second IEEE International Conference on Trust, 2020

Cross-Layer Strategic Ensemble Defense Against Adversarial Examples.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

LDP-Fed: federated learning with local differential privacy.
Proceedings of the 3rd International Workshop on Edge Systems, Analytics and Networking, 2020

A Framework for Evaluating Client Privacy Leakages in Federated Learning.
Proceedings of the Computer Security - ESORICS 2020, 2020

Understanding Object Detection Through an Adversarial Lens.
Proceedings of the Computer Security - ESORICS 2020, 2020

Promoting High Diversity Ensemble Learning with EnsembleBench.
Proceedings of the 2nd IEEE International Conference on Cognitive Machine Intelligence, 2020

2019
Efficient Locality Classification for Indoor Fingerprint-Based Systems.
IEEE Trans. Mob. Comput., 2019

Demystifying Learning Rate Polices for High Accuracy Training of Deep Neural Networks.
CoRR, 2019

DA-LSTM: A Long Short-Term Memory with Depth Adaptive to Non-uniform Information Flow in Sequential Data.
CoRR, 2019

Deep Neural Network Ensembles Against Deception: Ensemble Diversity, Accuracy and Robustness.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019

GRAHIES: Multi-Scale Graph Representation Learning with Latent Hierarchical Structure.
Proceedings of the 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI), 2019

Demystifying Learning Rate Policies for High Accuracy Training of Deep Neural Networks.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

Denoising and Verification Cross-Layer Ensemble Against Black-box Adversarial Attacks.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Representation Learning of Pedestrian Trajectories Using Actor-Critic Sequence-to-Sequence Autoencoder.
CoRR, 2018

2014
Impact of information technology on the performance of logistics industry: the case of Hong Kong and Pearl Delta region.
J. Oper. Res. Soc., 2014

2009
A RFID-case-based sample management system for fashion product development.
Eng. Appl. Artif. Intell., 2009


  Loading...