Author of the publication

Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning.

, , , , , and . ACM Multimedia, page 1577-1587. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels., , , , , and . RAID, volume 11050 of Lecture Notes in Computer Science, page 691-710. Springer, (2018)PTAD: Provable and Traceable Assured Deletion in Cloud Storage., , , and . ISCC, page 1-6. IEEE, (2019)T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud., , , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (1): 867-885 (2023)A Generalized Trusted Virtualized Platform Architecture., , and . ICYCS, page 2340-2346. IEEE Computer Society, (2008)Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 192-204. Springer, (2017)HyPRE: Hybrid Proxy Re-Encryption for Secure Multimedia Data Sharing on Mobile Devices., , , , , , and . ICME, page 1-6. IEEE, (2024)SeLance: Secure Load Balancing of Virtual Machines in Cloud., , , and . Trustcom/BigDataSE/ISPA, page 662-669. IEEE, (2016)MultiPol: Towards a Multi-policy Authorization Framework for RESTful Interfaces in the Cloud., , , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 214-226. Springer, (2016)Making least privilege the low-hanging fruit in clouds., , , , and . ICC, page 1-7. IEEE, (2017)A Way of Key Management in Cloud Storage Based on Trusted Computing., , , and . NPC, volume 6985 of Lecture Notes in Computer Science, page 135-145. Springer, (2011)