Junbin Fang

Follow

Generating author description...

All published works
Action Title Year Authors
+ PDF Chat State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems 2024 Junbin Fang
You Jiang
Canjian Jiang
Zoe L. Jiang
Chuanyi Liu
Siu‐Ming Yiu
+ PDF Chat Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation 2024 Junbin Fang
Canjian Jiang
You Jiang
Puxi Lin
Zhaojie Chen
Yujing Sun
Siu‐Ming Yiu
Zoe L. Jiang
+ PDF Chat Secure HARQ-IR-Aided Terahertz Communications 2023 Yongkang Li
Ziyang Song
Zheng Shi
Qingping Dou
Hongjiang Lei
Jinming Wen
Junbin Fang
+ Privacy-Preserving Distributed Machine Learning Made Faster 2023 Zoe L. Jiang
Jiajing Gu
H. Wang
Yulin Wu
Junbin Fang
Siu Ming Yiu
Wenjian Luo
Xuan Wang
+ State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems 2023 Junbin Fang
You Jiang
Canjian Jiang
Zoe L. Jiang
Siu‐Ming Yiu
Chuanyi Liu
+ Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation 2023 Junbin Fang
Canjian Jiang
You Jiang
Puxi Lin
Zhaojie Chen
Yujing Sun
Siu‐Ming Yiu
Zoe L. Jiang
+ Secure HARQ-IR-Aided Terahertz Communications 2023 Yongkang Li
Ziyang Song
Zheng Shi
Qingping Dou
Hongjiang Lei
Jinming Wen
Junbin Fang
+ PDF Chat Improved polar-code-based efficient post-processing algorithm for quantum key distribution 2022 Junbin Fang
Zhengzhong Yi
Jin Li
Zhipeng Liang
Yulin Wu
Lei Wen
Zoe L. Jiang
Xuan Wang
+ Privacy-Preserving Distributed Machine Learning Made Faster 2022 Zoe L. Jiang
Jiajing Gu
Hongxiao Wang
Yulin Wu
Junbin Fang
Siu‐Ming Yiu
Wenjian Luo
Xuan Wang
+ An Efficient Flicker-Free FEC Coding Scheme for Dimmable Visible Light Communication Based on Polar Codes 2017 Junbin Fang
Zhen Che
Zoe L. Jiang
Xiaolong Yu
Siu-Ming Yiu
Kui Ren
Xiaoqing Tan
Zhe Chen
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels 2009 Erdal Arıkan
2
+ The algorithm for calculating integrals of hypergeometric type functions and its realization in REDUCE system 1990 Victor Adamchik
O. I. Marichev
1
+ PDF Chat Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances 1999 Hoi-Kwong Lo
H. F. Chau
1
+ PDF Chat A simple proof of unconditional security of relativistic quantum cryptography 2001 S. N. Molotkov
S. S. Nazin
1
+ PDF Chat A Real-Time QKD System Based on FPGA 2012 Hongfei Zhang
Jian Wang
Ke Cui
Luo Chunli
Sheng-zhao Lin
Lei Zhou
H. Liang
Teng-Yun Chen
Kai Chen
Jian-Wei Pan
1
+ PDF Chat Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation 2009 Anthony Leverrier
Philippe Grangier
1
+ Quantum cryptography: Public key distribution and coin tossing 2014 Charles H. Bennett
Gilles Brassard
1
+ PDF Chat Practical issues in quantum-key-distribution postprocessing 2010 Chi‐Hang Fred Fung
Xiongfeng Ma
H. F. Chau
1
+ PDF Chat A simple proof of the unconditional security of quantum key distribution 2001 Hoi‐Kwong Lo
1
+ PDF Chat Fast, efficient error reconciliation for quantum cryptography 2003 W. T. Buttler
S. K. Lamoreaux
J. R. Torgerson
George H. Nickel
Christopher H. Donahue
C. G. Peterson
1
+ PDF Chat Simple Proof of Security of the BB84 Quantum Key Distribution Protocol 2000 Peter W. Shor
John Preskill
1
+ PDF Chat Channel coding: The road to channel capacity 2007 Daniel J. Costello
G. David Forney
1
+ Efficient One-Way Secret-Key Agreement and Private Channel Coding via Polarization 2013 Joseph M. Renes
Renato Renner
David Sutter
1
+ PDF Chat On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels 2009 Xiaojun Tang
Ruoheng Liu
Predrag Spasojević
H. Vincent Poor
1
+ PDF Chat A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing 2014 Nino Walenta
Andreas Burg
Dario Caselunghe
Joseph Constantin
Nicolas Gisin
Olivier Guinnard
Raphaël Houlmann
Pascal Junod
Boris Korzh
Natalia Kulesza
1
+ PDF Chat Performance and construction of polar codes on symmetric binary-input memoryless channels 2009 Ryuhei Mori
Toshiyuki Tanaka
1
+ PDF Chat How to Construct Polar Codes 2013 Ido Tal
Alexander Vardy
1
+ PDF Chat Proof of security of quantum key distribution with two-way classical communications 2003 Daniel Gottesman
Hoi‐Kwong Lo
1
+ PDF Chat Rate Adaptation for Secure HARQ Protocols 2018 Maël Le Treust
Leszek SzczeciƄski
Fabrice Labeau
1
+ Invisible Mask: Practical Attacks on Face Recognition with Infrared 2018 Zhe Zhou
Di Tang
XiaoFeng Wang
Weili Han
Xiangyu Liu
Kehuan Zhang
1
+ PDF Chat Adversarial Examples: Opportunities and Challenges 2019 Jiliang Zhang
Chen Li
1
+ Projecting Trouble: Light Based Adversarial Attacks on Deep Learning Classifiers 2018 Nicole Nichols
Robert Jasper
1
+ PDF Chat High-throughput and low-cost LDPC reconciliation for quantum key distribution 2019 Haokun Mao
Qiong Li
Han Qi
Hong Guo
1
+ Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey 2018 Naveed Akhtar
Ajmal Mian
1
+ PDF Chat New results on the sum of Gamma random variates with application to the performance of wireless communication systems over Nakagami‐<i>m</i> fading channels 2014 Imran Shafique Ansari
Ferkan Yılmaz
Mohamed‐Slim Alouini
Oğuz Kucur
1
+ PDF Chat Asymptotic Outage Analysis of HARQ-IR Over Time-Correlated Nakagami- $m$ Fading Channels 2017 Zheng Shi
Shaodan Ma
Guanghua Yang
Kam‐Weng Tam
Minghua Xia
1
+ PDF Chat End-To-End Interpretable Neural Motion Planner 2019 Wenyuan Zeng
Wenjie Luo
Simon Su
Abbas Sadat
Bin Yang
Sergio Casas
Raquel Urtasun
1
+ PDF Chat Error Analysis of Mixed THz-RF Wireless Systems 2019 Alexandros‐Apostolos A. Boulogeorgos
Angeliki Alexiou
1
+ PDF Chat Secure quantum key distribution with realistic devices 2020 Feihu Xu
Xiongfeng Ma
Qiang Zhang
Hoi‐Kwong Lo
Jian-Wei Pan
1
+ PDF Chat A Survey on Distributed Machine Learning 2020 Joost Verbraeken
Matthijs Wolting
Jonathan Katzy
Jeroen Kloppenburg
Tim Verbelen
Jan S. Rellermeyer
1
+ PDF Chat Universal Physical Camouflage Attacks on Object Detectors 2020 Lifeng Huang
Chengying Gao
Yuyin Zhou
Cihang Xie
Alan Yuille
Changqing Zou
Ning Liu
1
+ PDF Chat Adversarial Light Projection Attacks on Face Recognition Systems: A Feasibility Study 2020 Dinh-Luan Nguyen
Sunpreet S. Arora
Yuhang Wu
Hao Yang
1
+ PDF Chat Secure Transmission for Intelligent Reflecting Surface-Assisted mmWave and Terahertz Systems 2020 Jingping Qiao
Mohamed‐Slim Alouini
1
+ PDF Chat Quantum cryptography 2002 Nicolas Gisin
G. Ribordy
Wolfgang Tittel
Hugo Zbinden
1
+ SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial Perturbations 2020 Giulio Lovisotto
Henry Turner
Ivo Sluganovic
Martin Strohmeier
Ivan Martinović
1
+ PDF Chat 10-Mb/s Quantum Key Distribution 2018 Zhiliang Yuan
Akira Murakami
Mamko Kujiraoka
Marco Lucamarini
Yoshimichi Tanizawa
Hideaki Sato
A. J. Shields
Alan Plews
Ririka Takahashi
Kazuaki Doi
1
+ PDF Chat One Pixel Attack for Fooling Deep Neural Networks 2019 Jiawei Su
Danilo Vargas
Kouichi Sakurai
1
+ PDF Chat Practical challenges in quantum key distribution 2016 Eleni Diamanti
Hoi-Kwong Lo
Bing Qi
Zhiliang Yuan
1
+ PDF Chat Efficient reconciliation protocol for discrete-variable quantum key distribution 2009 David Elkouss
Anthony Leverrier
Romain Alléaume
Joseph J. Boutros
1
+ PDF Chat Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes 2011 Hessam Mahdavifar
Alexander Vardy
1
+ PDF Chat Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink 2021 Ranjie Duan
Xiaofeng Mao
A. K. Qin
Yuefeng Chen
Shaokai Ye
Yuan He
Yun Yang
1
+ PDF Chat Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect 2021 Athena Sayles
Ashish Hooda
Mohit Gupta
Rahul Chatterjee
Earlence Fernandes
1
+ PDF Chat The Translucent Patch: A Physical and Universal Attack on Object Detectors 2021 Alon Zolfi
Moshe Kravchik
Yuval Elovici
Asaf Shabtai
1
+ PDF Chat Adversarial Imaging Pipelines 2021 Buu Phan
Fahim Mannan
Felix Heide
1
+ PDF Chat Fooling Thermal Infrared Pedestrian Detectors in Real World Using Small Bulbs 2021 Xiaopei Zhu
Xiao Li
Jianmin Li
Zheyao Wang
Xiaolin Hu
1
+ PDF Chat Over-the-Air Adversarial Flickering Attacks against Video Recognition Networks 2021 Roi Pony
Itay Naeh
Shie Mannor
1
+ Adv-Makeup: A New Imperceptible and Transferable Attack on Face Recognition 2021 Bangjie Yin
Wenxuan Wang
Taiping Yao
Junfeng Guo
Zelun Kong
Shouhong Ding
Jilin Li
Cong Liu
1
+ PDF Chat Optical Adversarial Attack 2021 Abhiram Gnanasambandam
Alex Sherman
Stanley H. Chan
1
+ Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey 2021 Naveed Akhtar
Ajmal Mian
Navid Kardan
Mubarak Shah
1
+ PDF Chat They See Me Rollin’: Inherent Vulnerability of the Rolling Shutter in CMOS Image Sensors 2021 Sebastian Köhler
Giulio Lovisotto
Simon Birnbach
Richard Baker
Ivan Martinović
1