Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks., , , , , and . USENIX Security Symposium, page 2117-2134. USENIX Association, (2022)Unleashing the Power of Shared Label Structures for Human Activity Recognition., , , , , and . CIKM, page 3340-3350. ACM, (2023)Understanding the Working Time of Developers in IT Companies in China and the United States., , , , , , and . IEEE Softw., 38 (2): 96-106 (2021)Task Offloading for Post-disaster Rescue in Vehicular Fog Computing-assisted UAV Networks., , , , and . MSN, page 105-112. IEEE, (2022)Understanding the User Interactions on GitHub: A Social Network Perspective., , , , and . CSCWD, page 1148-1153. IEEE, (2021)A System-Level Solution for Low-Power Object Detection., , , , , , , , , and 1 other author(s). ICCV Workshops, page 2461-2468. IEEE, (2019)How Few Davids Improve One Goliath: Federated Learning in Resource-Skewed Edge Computing Environments., , , , , , , and . WWW, page 2976-2985. ACM, (2024)DeepLoc: A Location Preference Prediction System for Online Lodging Platforms., , , , , , and . ChineseCSCW, volume 1042 of Communications in Computer and Information Science, page 618-630. Springer, (2019)Fawkes: Protecting Privacy against Unauthorized Deep Learning Models., , , , , and . USENIX Security Symposium, page 1589-1604. USENIX Association, (2020)Detecting Malicious Accounts in Online Developer Communities Using Deep Learning., , , , , , and . CIKM, page 1251-1260. ACM, (2019)