Author of the publication

MIRA: Cracking Black-box Watermarking on Deep Neural Networks via Model Inversion-based Removal Attacks.

, , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of a hydraulic driven Camellia cultivation machine with replaceable working arms., , , , and . URAI, page 903-906. IEEE, (2017)Cracking White-box DNN Watermarks via Invariant Neuron Transforms., , , , and . CoRR, (2022)MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting., , , and . KDD, page 1327-1336. ACM, (2022)Modeling Extreme Events in Time Series Prediction., , , , and . KDD, page 1114-1122. ACM, (2019)Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated Driving System from Appearing Attacks., , , , , and . USENIX Security Symposium, page 2939-2956. USENIX Association, (2023)Improving the Robustness of Wasserstein Embedding by Adversarial PAC-Bayesian Learning., , , , and . AAAI, page 3791-3800. AAAI Press, (2020)No-Skim: Towards Efficiency Robustness Evaluation on Skimming-based Language Models., , , and . CoRR, (2023)BELT: Old-School Backdoor Attacks can Evade the State-of-the-Art Defense with Backdoor Exclusivity Lifting., , , , and . CoRR, (2023)How Sequence-to-Sequence Models Perceive Language Styles?, , , and . CoRR, (2019)A Geometrical Perspective on Image Style Transfer With Adversarial Learning., , , and . IEEE Trans. Pattern Anal. Mach. Intell., 44 (1): 63-75 (2022)