Skip to main content

Showing 1–2 of 2 results for author: Wang, E K

  1. arXiv:2005.07606   

    cs.LG stat.ML

    Initializing Perturbations in Multiple Directions for Fast Adversarial Training

    Authors: Xunguang Wang, Ship Peng Xu, Eric Ke Wang

    Abstract: Recent developments in the filed of Deep Learning have demonstrated that Deep Neural Networks(DNNs) are vulnerable to adversarial examples. Specifically, in image classification, an adversarial example can fool the well trained deep neural networks by adding barely imperceptible perturbations to clean images. Adversarial Training, one of the most direct and effective methods, minimizes the losses… ▽ More

    Submitted 25 January, 2021; v1 submitted 15 May, 2020; originally announced May 2020.

    Comments: has no contribution

  2. arXiv:1004.0591  [pdf

    cs.CR cs.NI

    A new key establishment scheme for wireless sensor networks

    Authors: Eric Ke Wang, Lucas C. K. Hui, S. M. Yiu

    Abstract: Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated… ▽ More

    Submitted 5 April, 2010; originally announced April 2010.

    Comments: 11Pages

    Journal ref: International Journal of Network Security & Its Applications 1.2 (2009) 17-27