Author of the publication

Traffic Analytics Development Kits (TADK): Enable Real-Time AI Inference in Networking Apps.

, , , , , , , , , and . ICUFN, page 392-398. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of agricultural industrial structure adjustment on energy conservation and income growth in Western China: a statistical study., , and . Ann. Oper. Res., 228 (1): 23-33 (2015)An approach for test data generation using program slicing and particle swarm optimization., , , , and . Neural Comput. Appl., 25 (7-8): 2047-2055 (2014)Recognizing the HRRP by Combining CNN and BiRNN With Attention Mechanism., , , , , and . IEEE Access, (2020)Fault Localization for Null Pointer Exception Based on Stack Trace and Program Slicing., , , , , and . QSIC, page 9-12. IEEE, (2012)Towards More Suitable Personalization in Federated Learning via Decentralized Partial Model Training., , , , , , and . CoRR, (2023)Backdoor Vulnerabilities in Normally Trained Deep Learning Models., , , , , , , , , and . CoRR, (2022)Better Trigger Inversion Optimization in Backdoor Scanning., , , , , , , and . CVPR, page 13358-13368. IEEE, (2022)TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks., , , , and . ICSE, page 986-998. ACM, (2020)Programming support for autonomizing software., , , , and . PLDI, page 702-716. ACM, (2019)Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense., , , , , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 19879-19892. PMLR, (2022)