Author of the publication

An effective and practical gradient inversion attack.

, , , , , and . Int. J. Intell. Syst., 37 (11): 9373-9389 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transfer subspace learning via label release and contribution degree distinction., , , , and . Inf. Sci., (2023)ELAA: An efficient local adversarial attack using model interpreters., , , , and . Int. J. Intell. Syst., 37 (12): 10598-10620 (December 2022)A Graded Reversible Watermarking Scheme for Relational Data., and . Mob. Networks Appl., 26 (4): 1552-1563 (2021)Towards explainable model extraction attacks., , , , , and . Int. J. Intell. Syst., 37 (11): 9936-9956 (2022)Privacy-preserving image retrieval in a distributed environment., , , and . Int. J. Intell. Syst., 37 (10): 7478-7501 (2022)A stealthy and robust backdoor attack via frequency domain transform., , , , and . World Wide Web (WWW), 26 (5): 2767-2783 (September 2023)Explanation-based data-free model extraction attacks., , , and . World Wide Web (WWW), 26 (5): 3081-3092 (September 2023)Similarity-based integrity protection for deep learning systems., , , , , and . Inf. Sci., (2022)Universal Adversarial Perturbations of Malware., , , , and . CSS, volume 12653 of Lecture Notes in Computer Science, page 9-19. Springer, (2020)An effective and practical gradient inversion attack., , , , , and . Int. J. Intell. Syst., 37 (11): 9373-9389 (2022)