Author of the publication

DeHiB: Deep Hidden Backdoor Attack on Semi-supervised Learning via Adversarial Perturbation.

, , , , , , and . AAAI, page 10585-10593. AAAI Press, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Caching in the Sky: Proactive Deployment of Cache-Enabled Unmanned Aerial Vehicles for Optimized Quality-of-Experience., , , , , and . CoRR, (2016)Energy Efficient Federated Learning Over Wireless Communication Networks., , , , and . CoRR, (2019)Federated Learning for Task and Resource Allocation in Wireless High Altitude Balloon Networks., , , , , , and . CoRR, (2020)Joint Access and Backhaul Resource Management in Satellite-Drone Networks: A Competitive Market Approach., , and . IEEE Trans. Wirel. Commun., 19 (6): 3908-3923 (2020)Liquid State Machine Learning for Resource and Cache Management in LTE-U Unmanned Aerial Vehicle (UAV) Networks., , and . IEEE Trans. Wirel. Commun., 18 (3): 1504-1517 (2019)Delay Minimization for Federated Learning Over Wireless Communication Networks., , , , , , and . CoRR, (2020)Distributed and Democratized Learning: Philosophy and Research Challenges., , , , , , and . IEEE Comput. Intell. Mag., 16 (1): 49-62 (2021)Meta-Reinforcement Learning for Reliable Communication in THz/VLC Wireless VR Networks., , , , , , and . IEEE Trans. Wirel. Commun., 21 (9): 7778-7793 (2022)SSAPPIDENTIFY: A robust system identifies application over Shadowsocks's traffic., , , , and . Comput. Networks, (2022)GramMatch: An automatic protocol feature extraction and identification system., , , and . Comput. Networks, (2021)