Author of the publication

All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning.

, , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SUB-PLAY: Adversarial Policies against Partially Observed Multi-Agent Reinforcement Learning Systems., , , , , , , and . CoRR, (2024)MEAOD: Model Extraction Attack against Object Detectors., , , , , , and . CoRR, (2023)"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution., , , , , , , and . CCS, page 1157-1171. ACM, (2022)Privacy Preserving Scheme for Location Based Services Using Cryptographic Approach., , , , , and . PAC, page 125-126. IEEE, (2018)R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme., , , and . IEEE Internet Things J., 7 (9): 8077-8089 (2020)A Blockchain-Based Privacy-Preserving Mechanism for Attribute Matching in Social Networks., , , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 627-639. Springer, (2020)Two Secure Privacy-Preserving Data Aggregation Schemes for IoT., , , , , , and . Wirel. Commun. Mob. Comput., (2019)The Risk of Federated Learning to Skew Fine-Tuning Features and Underperform Out-of-Distribution Robustness., , , , , and . CoRR, (2024)Hijack Vertical Federated Learning Models with Adversarial Embedding., , , , , , and . CoRR, (2022)Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention., , , , , , and . CoRR, (2023)