Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples., , , and . CoRR, (2018)Bit-Flip Attack: Crushing Neural Network With Progressive Bit Search., , and . ICCV, page 1211-1220. IEEE, (2019)DRAM-Locker: A General-Purpose DRAM Protection Mechanism against Adversarial DNN Weight Attacks., , , , and . CoRR, (2023)Sparse BD-Net: A Multiplication-less DNN with Sparse Binarized Depth-wise Separable Convolution., , , , and . ACM J. Emerg. Technol. Comput. Syst., 16 (2): 15:1-15:24 (2020)DA2: Deep Attention Adapter for Memory-EfficientOn-Device Multi-Domain Learning., , and . CoRR, (2020)EMGAN: Early-Mix-GAN on Extracting Server-Side Model in Split Federated Learning., , , , , and . AAAI, page 13545-13553. AAAI Press, (2024)NeurObfuscator: A Full-stack Obfuscation Tool to Mitigate Neural Architecture Stealing., , , , and . HOST, page 248-258. IEEE, (2021)RepNet: Efficient On-Device Learning via Feature Reprogramming., , and . CVPR, page 12267-12276. IEEE, (2022)TBT: Targeted Neural Network Attack With Bit Trojan., , and . CVPR, page 13195-13204. Computer Vision Foundation / IEEE, (2020)DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories., , , and . CoRR, (2021)