Author of the publication

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization.

, , , , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 9525-9536. PMLR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Impact of agricultural industrial structure adjustment on energy conservation and income growth in Western China: a statistical study., , and . Ann. Oper. Res., 228 (1): 23-33 (2015)Fault Localization for Null Pointer Exception Based on Stack Trace and Program Slicing., , , , , and . QSIC, page 9-12. IEEE, (2012)Better Trigger Inversion Optimization in Backdoor Scanning., , , , , , , and . CVPR, page 13358-13368. IEEE, (2022)BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2023)TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks., , , , and . ICSE, page 986-998. ACM, (2020)Constrained Optimization with Dynamic Bound-scaling for Effective NLP Backdoor Defense., , , , , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 19879-19892. PMLR, (2022)Programming support for autonomizing software., , , , and . PLDI, page 702-716. ACM, (2019)MEDIC: Remove Model Backdoors via Importance Driven Cloning., , , , , , , and . CVPR, page 20485-20494. IEEE, (2023)FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning., , , , , , , , , and 1 other author(s). ICLR, OpenReview.net, (2023)Towards More Suitable Personalization in Federated Learning via Decentralized Partial Model Training., , , , , , and . CoRR, (2023)