Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A WiFi RSSI ranking fingerprint positioning system and its application to indoor activities of daily living recognition., , and . IJDSN, (2019)DeepWE: A Deep Bayesian Active Learning Waypoint Estimator for Indoor Walkers., , , , , , , and . IEEE Internet Things J., 10 (11): 9738-9752 (June 2023)Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification., , , , , and . CoRR, (2023)Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge., , , and . IEEE Trans. Inf. Forensics Secur., (2022)Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks., , , , , , and . CIKM, page 3617-3621. ACM, (2021)WiFi Fingerprint Based, Indoor, Location-Driven Activities of Daily Living Recognition., , , and . BESC, page 148-151. IEEE, (2018)Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications., , , and . ICDM, page 1421-1426. IEEE, (2021)Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information., , , , , , and . USENIX Security Symposium, page 1181-1198. USENIX Association, (2023)Trustworthy Graph Neural Networks: Aspects, Methods, and Trends., , , , , and . Proc. IEEE, 112 (2): 97-139 (February 2024)Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization., , , and . CoRR, (2020)