default search action
Xuebing Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Xue Jiang, Xuebing Zhou, Jens Grossklags:
Distributed Synthetic Time-Series Data Generation With Local Differentially Private Federated Learning. IEEE Access 12: 157067-157082 (2024) - [j9]Derui Zhu, Jinfu Chen, Xuebing Zhou, Weiyi Shang, Ahmed E. Hassan, Jens Grossklags:
Vulnerabilities of Data Protection in Vertical Federated Learning Training and Countermeasures. IEEE Trans. Inf. Forensics Secur. 19: 3674-3689 (2024) - [c25]Krishna Kanth Nakka, Ahmed Frikha, Ricardo Mendes, Xue Jiang, Xuebing Zhou:
Federated Hyperparameter Optimization through Reward-Based Strategies: Challenges and Insights. CVPR Workshops 2024: 4236-4244 - [i5]Krishna Kanth Nakka, Ahmed Frikha, Ricardo Mendes, Xue Jiang, Xuebing Zhou:
PII-Compass: Guiding LLM training data extraction prompts towards the target PII via grounding. CoRR abs/2407.02943 (2024) - [i4]Ahmed Frikha, Nassim Walha, Krishna Kanth Nakka, Ricardo Mendes, Xue Jiang, Xuebing Zhou:
IncogniText: Privacy-enhancing Conditional Text Anonymization via LLM-based Private Attribute Randomization. CoRR abs/2407.02956 (2024) - [i3]Ahmed Frikha, Nassim Walha, Ricardo Mendes, Krishna Kanth Nakka, Xue Jiang, Xuebing Zhou:
ObfuscaTune: Obfuscated Offsite Fine-tuning and Inference of Proprietary LLMs on Private Datasets. CoRR abs/2407.02960 (2024) - [i2]Haoran Li, Wei Fan, Yulin Chen, Jiayang Cheng, Tianshu Chu, Xuebing Zhou, Peizhao Hu, Yangqiu Song:
Privacy Checklist: Privacy Violation Detection Grounding on Contextual Integrity Theory. CoRR abs/2408.10053 (2024) - [i1]Krishna Kanth Nakka, Ahmed Frikha, Ricardo Mendes, Xue Jiang, Xuebing Zhou:
PII-Scope: A Benchmark for Training Data PII Leakage Assessment in LLMs. CoRR abs/2410.06704 (2024) - 2023
- [j8]Xue Jiang, Yufei Zhang, Xuebing Zhou, Jens Grossklags:
Distributed GAN-Based Privacy-Preserving Publication of Vertically-Partitioned Data. Proc. Priv. Enhancing Technol. 2023(2): 236-250 (2023) - 2022
- [j7]Xue Jiang, Xuebing Zhou, Jens Grossklags:
Privacy-Preserving High-dimensional Data Collection with Federated Generative Autoencoder. Proc. Priv. Enhancing Technol. 2022(1): 481-500 (2022) - [j6]Xue Jiang, Xuebing Zhou, Jens Grossklags:
Comprehensive Analysis of Privacy Leakage in Vertical Federated Learning During Prediction. Proc. Priv. Enhancing Technol. 2022(2): 263-281 (2022) - [j5]Xue Jiang, Xuebing Zhou, Jens Grossklags:
SignDS-FL: Local Differentially Private Federated Learning with Sign-based Dimension Selection. ACM Trans. Intell. Syst. Technol. 13(5): 74:1-74:22 (2022) - 2021
- [c24]Derui Zhu, Jinfu Chen, Weiyi Shang, Xuebing Zhou, Jens Grossklags, Ahmed E. Hassan:
DeepMemory: Model-based Memorization Analysis of Deep Neural Language Models. ASE 2021: 1003-1015
2010 – 2019
- 2014
- [p1]Claudia Nickel, Xuebing Zhou, Mohan Liu, Patrick Ndjiki-Nya:
Content Identification and Quality-Based Ranking. Towards the Internet of Services 2014: 101-110 - 2013
- [c23]Martin Böckeler, Xuebing Zhou:
An Efficient 3D Facial Landmark Detection Algorithm with Haar-like Features and Anthropometric Constraints. BIOSIG 2013: 345 - 2012
- [b1]Xuebing Zhou:
Privacy and security assessment of biometric template protection. Darmstadt University of Technology, Germany, 2012, pp. 1-126 - [j4]Xuebing Zhou:
Privacy and Security Assessment of Biometric Template Protection. it Inf. Technol. 54(4): 197- (2012) - [c22]Xuebing Zhou, Arjan Kuijper, Christoph Busch:
Retrieving secrets from iris fuzzy commitment. ICB 2012: 238-244 - [c21]Koen Simoens, Bian Yang, Xuebing Zhou, Filipe Beato, Christoph Busch, Elaine M. Newton, Bart Preneel:
Criteria towards metrics for benchmarking template protection algorithms. ICB 2012: 498-505 - [c20]Xuebing Zhou, Christoph Busch:
Measuring privacy and security of iris fuzzy commitment. ICCST 2012: 168-173 - [c19]Bian Yang, Lisa Rajbhandari, Christoph Busch, Xuebing Zhou:
Privacy Implications of Identity References in Biometrics Databases. IIH-MSP 2012: 25-30 - [c18]Xuebing Zhou:
A Practical View of Privacy Preserving Biometric Authentication. Sicherheit 2012: 6 - 2011
- [j3]Christoph Busch, Ulrike Korte, Sebastian Abt, Christian Böhm, Ines Färber, Sergej Fries, Johannes Merkle, Claudia Nickel, Alexander Nouak, Alexander Opel, Annahita Oswald, Thomas Seidl, Bianca Wackersreuther, Peter Wackersreuther, Xuebing Zhou:
Biometric Template Protection - Ein Bericht über das Projekt BioKeyS. Datenschutz und Datensicherheit 35(3): 183-191 (2011) - [c17]Xuebing Zhou, Arjan Kuijper, Raymond N. J. Veldhuis, Christoph Busch:
Quantifying privacy and security of biometric fuzzy commitment. IJCB 2011: 1-8 - 2010
- [c16]Tom A. M. Kevenaar, Ulrike Korte, Johannes Merkle, Matthias Niesing, Heinrich Ihmor, Christoph Busch, Xuebing Zhou:
A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems. BIOSIG 2010: 45-56 - [c15]Claudia Nickel, Xuebing Zhou, Christoph Busch:
Template Protection for Biometric Gait Data. BIOSIG 2010: 73-81 - [c14]Xuebing Zhou, Silvia Araujo Sánchez, Arjan Kuijper:
3D Face Recognition with Local Binary Patterns. IIH-MSP 2010: 329-332 - [c13]Xuebing Zhou, Ton Kalker:
On the security of biohashing. Media Forensics and Security 2010: 75410Q - [c12]Christoph Busch, Sebastian Abt, Claudia Nickel, Ulrike Korte, Xuebing Zhou:
Biometrische Template-Protection-Verfahren und Interoperabilitätsstrategien. Sicherheit 2010: 1-12
2000 – 2009
- 2009
- [j2]Di Wu, Xuebing Zhou, Xiamu Niu:
A novel image hash algorithm resistant to print-scan. Signal Process. 89(12): 2415-2424 (2009) - [c11]Emile Kelkboom, Jeroen Breebaart, Raymond N. J. Veldhuis, Xuebing Zhou, Christoph Busch:
Multi-Sample Fusion with Template Protection. BIOSIG 2009: 55-67 - [c10]Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch, Arjan Kuijper:
A Security Analysis of Biometric Template Protection Schemes. ICIAR 2009: 429-438 - [c9]Claudia Nickel, Christoph Busch, Xuebing Zhou:
Template Protection via Piecewise Hashing. IIH-MSP 2009: 1056-1060 - [c8]Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch, Arjan Kuijper:
Feature Correlation Attack on Biometric Privacy Protection Schemes. IIH-MSP 2009: 1061-1065 - 2008
- [j1]Tom A. M. Kevenaar, Michiel van der Veen, Xuebing Zhou, Christoph Busch:
Privacy for biometric identification information. Datenschutz und Datensicherheit 32(6): 393-395 (2008) - [c7]Xuebing Zhou, Helmut Seibert, Christoph Busch, Wolfgang Funk:
A 3D Face Recognition Algorithm Using Histogram-based Features. 3DOR@Eurographics 2008: 65-71 - [c6]Xuebing Zhou, Christoph Busch:
A Novel Privacy Enhancing Algorithm for Biometric System. BIOSIG 2008: 39-46 - [c5]Thomas Frassen, Xuebing Zhou, Christoph Busch:
Fuzzy Vault for 3D Face Recognition Systems. IIH-MSP 2008: 1069-1074 - 2007
- [c4]Xuebing Zhou, Tom A. M. Kevenaar, Emile Kelkboom, Christoph Busch, Michiel van der Veen, Alexander Nouak:
Privacy enhancing technology for a 3D-face recognition system. BIOSIG 2007: 3-14 - 2006
- [c3]Kevin Hamon, Martin Schmucker, Xuebing Zhou:
Histogram-Based Perceptual Hashing for Minimally Changing Video Sequences. AXMEDIS 2006: 236-241 - [c2]Xuebing Zhou, Martin Schmucker, Christopher L. Brown:
Video Perceptual Hashing Using Interframe Similarity. Sicherheit 2006: 107-110 - 2005
- [c1]Xuebing Zhou, Martin Schmucker, Christopher L. Brown:
Perceptual Hashing of Video Content Based on Differential Block Similarity. CIS (2) 2005: 80-85
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint