Author of the publication

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization.

, , , , , and . IEEE Trans. Multim., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EthPloit: From Fuzzing to Efficient Exploit Generation against Smart Contracts., , , and . SANER, page 116-126. IEEE, (2020)Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing., , , , , , and . IEEE Trans. Serv. Comput., 16 (1): 504-514 (January 2023)VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data., , , , , , , and . IEEE Trans. Serv. Comput., 16 (1): 698-710 (January 2023)Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System., , , , , , and . IEEE Internet Things J., 10 (19): 16715-16726 (October 2023)A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT., , , , , , and . IEEE Trans. Ind. Informatics, 18 (7): 4456-4465 (2022)Consensus-Clustering-Based Automatic Distribution Matching for Cross-Domain Image Steganalysis., , , , and . IEEE Trans. Knowl. Data Eng., 35 (6): 5665-5679 (June 2023)μDep: Mutation-based Dependency Generation for Precise Taint Analysis on Android Native Code., , , , , and . CoRR, (2021)Collaborative 'many to many' DDoS detection in cloud., , and . Int. J. Ad Hoc Ubiquitous Comput., 23 (3/4): 192-202 (2016)SMARTSHIELD: Automatic Smart Contract Protection Made Easy., , , , , and . SANER, page 23-34. IEEE, (2020)Are Android Apps Being Protected Well Against Attacks?, , and . IEEE Wirel. Commun., 27 (3): 66-71 (2020)