Author of the publication

TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing.

, , , , and . CCS, page 2096-2112. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Breaking Deep Generative Model-based Defenses and Beyond., , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 1736-1745. PMLR, (2020)RoLL: Real-Time and Accurate Route Leak Location with AS Triplet Features., , , , and . ICC, page 5240-5246. IEEE, (2023)Low power design methodology for signal processing systems using lightweight dataflow techniques., , , , , , , , and . DASIP, page 82-89. IEEE, (2016)Cactus: Obfuscating Bidirectional Encrypted TCP Traffic at Client Side., , , , , , , , , and 3 other author(s). IEEE Trans. Inf. Forensics Secur., (2024)Resource-constrained implementation and optimization of a deep neural network for vehicle classification., , , , and . EUSIPCO, page 1862-1866. IEEE, (2016)Adversarial Training for Video Disentangled Representation., , , , , , and . MMM (2), volume 11296 of Lecture Notes in Computer Science, page 532-543. Springer, (2019)Unsupervised Classification of Street Architectures Based on InfoGAN., , , , , , , and . CoRR, (2019)SoftGuard: Defend Against the Low-Rate TCP Attack in SDN., , , and . ICC, page 1-6. IEEE, (2019)VeriDIP: Verifying Ownership of Deep Neural Networks through Privacy Leakage Fingerprints., , , and . CoRR, (2023)Disentangled Representation Learning for RF Fingerprint Extraction under Unknown Channel Statistics., , , , , and . CoRR, (2022)