Author of the publication

TRGE: A Backdoor Detection After Quantization.

, , , , and . Inscrypt (2), volume 14527 of Lecture Notes in Computer Science, page 394-398. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Examples: Attacks and Defenses for Deep Learning, , , and . (2017)cite arxiv:1712.07107Comment: Github: https://github.com/chbrian/awesome-adversarial-examples-dl.Poster: Reliable On-Ramp Merging via Multimodal Reinforcement Learning., , , , and . SEC, page 313-315. IEEE, (2022)The dose makes the poison - Leveraging uncertainty for effective malware detection., , , , , , , and . DSC, page 123-130. IEEE, (2017)ES Attack: Model Stealing Against Deep Neural Networks Without Data Hurdles., , , , and . IEEE Trans. Emerg. Top. Comput. Intell., 6 (5): 1258-1270 (2022)A Holistic Framework Towards Vision-based Traffic Signal Control with Microscopic Simulation., , , and . CoRR, (2024)Sensing to Learn: Deep Learning Based Wireless Sensing via Connected Digital and Physical Experiments., , , and . AHFE (6), volume 264 of Lecture Notes in Networks and Systems, page 255-262. Springer, (2021)DeepDefense: Identifying DDoS Attack via Deep Learning., , and . SMARTCOMP, page 1-8. IEEE Computer Society, (2017)A Competitive Penalty Model for Availability Based Cloud SLA., , , , , and . CLOUD, page 964-970. IEEE Computer Society, (2015)Towards Robust On-Ramp Merging via Augmented Multimodal Reinforcement Learning., , , and . CoRR, (2022)Membership Inference Attacks and Defenses in Neural Network Pruning., and . USENIX Security Symposium, page 4561-4578. USENIX Association, (2022)