Rui Ning

Orcid: 0009-0007-6516-5067

According to our database1, Rui Ning authored at least 33 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Heterogeneous Graph Backdoor Attack.
CoRR, June, 2025

FlashForge: Ultra-Efficient Prefix-Aware Attention for LLM Decoding.
CoRR, May, 2025

PrivShap: A Finer-granularity Network Linearization Method for Private Inference.
Trans. Mach. Learn. Res., 2025

Deep Incomplete Multi-view Clustering via Multi-level Imputation and Contrastive Alignment.
Neural Networks, 2025

Enabling Virtual Priority in Data Center Congestion Control.
Proceedings of the Twentieth European Conference on Computer Systems, 2025

2024
Sub-Band Backdoor Attack in Remote Sensing Imagery.
Algorithms, May, 2024

Online path planning of pork cutting robot using 3D laser point cloud.
Ind. Robot, 2024

Comet: A Communication-efficient and Performant Approximation for Private Transformer Inference.
CoRR, 2024

Demo Abstract: Toward the Convergence of the Next-Generation Wireless and AI.
Proceedings of the IEEE INFOCOM 2024, 2024

SPOT: Structure Patching and Overlap Tweaking for Effective Pipelining in Privacy-Preserving MLaaS with Tiny Clients.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

A Dual Transfer Framework for Cooperative Spectrum Sensing in Cognitive Radio.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Research on Low-Temperature Storage Refrigeration Technology Based on Factors of Biological Sample Damage.
Proceedings of the 17th International Congress on Image and Signal Processing, 2024

MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep Learning.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Posture Estimation and Adjustment for Robotic Precise Peg-in-Hole Based on Fuzzy Variable Admittance Control.
Proceedings of the 14th Asian Control Conference, 2024

SEER: Backdoor Detection for Vision-Language Models through Searching Target Text and Image Trigger Jointly.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
ScanFed: Scalable Behavior-Based Backdoor Detection in Federated Learning.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

BlockFed: A High-Performance and Trustworthy Blockchain-Based Federated Learning Framework.
Proceedings of the IEEE Global Communications Conference, 2023

2022
TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers.
Proceedings of the IEEE INFOCOM 2022, 2022

Context-based Adblocker using Siamese Neural Network.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

Most and Least Retrievable Images in Visual-Language Query Systems.
Proceedings of the Computer Vision - ECCV 2022, 2022

ACADIA: Efficient and Robust Adversarial Attacks Against Deep Reinforcement Learning.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

Hunter: HE-Friendly Structured Pruning for Efficient Privacy-Preserving Deep Learning.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Hibernated Backdoor: A Mutual Information Empowered Backdoor Attack to Deep Neural Networks.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Optimal Deployment for Target-Barrier Coverage Problems in Wireless Sensor Networks.
IEEE Syst. J., 2021

Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

CLEAR: Clean-up Sample-Targeted Backdoor in Neural Networks.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

2020
Secure Mobile Computing by Using Convolutional and Capsule Deep Neural Networks.
PhD thesis, 2020

DeepMag+: Sniffing mobile apps in magnetic field through deep learning.
Pervasive Mob. Comput., 2020

GangSweep: Sweep out Neural Backdoors by GAN.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

2019
CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral Analysis.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
DeepMag: Sniffing Mobile Apps in Magnetic Field through Deep Convolutional Neural Networks.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018

Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Optimizing the heterogeneous network on-chip design in manycore architectures.
Proceedings of the 30th IEEE International System-on-Chip Conference, 2017


  Loading...