default search action
Ruitao Hou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Ruitao Hou, Kanghua Mo, Yucheng Long, Ning Li, Yuan Rao:
Exploring the vulnerability of self-supervised monocular depth estimation models. Inf. Sci. 677: 120874 (2024) - 2023
- [j11]Xiaojin Fan, Ruitao Hou, Lei Chen, Liehuang Zhu, Jingjing Hu:
Transfer subspace learning via label release and contribution degree distinction. Inf. Sci. 642: 118724 (2023) - [j10]Ruitao Hou, Teng Huang, Hongyang Yan, Lishan Ke, Weixuan Tang:
A stealthy and robust backdoor attack via frequency domain transform. World Wide Web (WWW) 26(5): 2767-2783 (2023) - [j9]Anli Yan, Ruitao Hou, Hongyang Yan, Xiaozhang Liu:
Explanation-based data-free model extraction attacks. World Wide Web (WWW) 26(5): 3081-3092 (2023) - 2022
- [j8]Fucai Zhou, Shiyue Qin, Ruitao Hou, Zongye Zhang:
Privacy-preserving image retrieval in a distributed environment. Int. J. Intell. Syst. 37(10): 7478-7501 (2022) - [j7]Zeren Luo, Chuangwei Zhu, Lujie Fang, Guang Kou, Ruitao Hou, Xianmin Wang:
An effective and practical gradient inversion attack. Int. J. Intell. Syst. 37(11): 9373-9389 (2022) - [j6]Anli Yan, Ruitao Hou, Xiaozhang Liu, Hongyang Yan, Teng Huang, Xianmin Wang:
Towards explainable model extraction attacks. Int. J. Intell. Syst. 37(11): 9936-9956 (2022) - [j5]Shangwei Guo, Siyuan Geng, Tao Xiang, Hangcheng Liu, Ruitao Hou:
ELAA: An efficient local adversarial attack using model interpreters. Int. J. Intell. Syst. 37(12): 10598-10620 (2022) - [j4]Ruitao Hou, Shan Ai, Qi Chen, Hongyang Yan, Teng Huang, Kongyang Chen:
Similarity-based integrity protection for deep learning systems. Inf. Sci. 601: 255-267 (2022) - [j3]Jiewei Lai, Yantong Huo, Ruitao Hou, Xianmin Wang:
A Universal Detection Method for Adversarial Examples and Fake Images. Sensors 22(9): 3445 (2022) - [c2]Pengfei Huang, Wanqing Jie, Arthur Sandor Voundi Koe, Ruitao Hou, Hongyang Yan, Mourad Nouioua, Phan Duc Thien, Jacques Mbous Ikong, Camara Lancine:
Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric. ML4CS (2) 2022: 455-468 - 2021
- [j2]Ruitao Hou, Hequn Xian:
A Graded Reversible Watermarking Scheme for Relational Data. Mob. Networks Appl. 26(4): 1552-1563 (2021) - 2020
- [j1]Teng Huang, Qixiang Zhang, Jiabao Liu, Ruitao Hou, Xianmin Wang, Ya Li:
Adversarial attacks on deep-learning-based SAR image target recognition. J. Netw. Comput. Appl. 162: 102632 (2020) - [c1]Ruitao Hou, Xiaoyu Xiang, Qixiang Zhang, Jiabao Liu, Teng Huang:
Universal Adversarial Perturbations of Malware. CSS 2020: 9-19
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-05 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint