Author of the publication

Text-to-Image Diffusion Models can be Easily Backdoored through Multimodal Data Poisoning.

, , , , , and . ACM Multimedia, page 1577-1587. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Simple and Effective Method to Improve Zero-Shot Cross-Lingual Transfer Learning., , , , , , , , and . COLING, page 4372-4380. International Committee on Computational Linguistics, (2022)A Privacy Preserving Computer-aided Medical Diagnosis Framework with Outsourced Model., , , , , , , and . BIBM, page 1080-1087. IEEE, (2023)Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability., , , , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 500-518. Springer, (2015)POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts., , , , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 585-589. Springer, (2015)Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model., , , , , and . Comput. J., 64 (4): 509-533 (2021)Hierarchical and non-monotonic key-policy attribute-based encryption and its application., , , , , , and . Inf. Sci., (2022)MH-pFLGB: Model Heterogeneous Personalized Federated Learning via Global Bypass for Medical Image Analysis., , , , , , , , , and . MICCAI (10), volume 15010 of Lecture Notes in Computer Science, page 534-545. Springer, (2024)NÜWA: Visual Synthesis Pre-training for Neural visUal World creAtion., , , , , , and . ECCV (16), volume 13676 of Lecture Notes in Computer Science, page 720-736. Springer, (2022)Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption., , , , and . ICICS, volume 10631 of Lecture Notes in Computer Science, page 192-204. Springer, (2017)HyPRE: Hybrid Proxy Re-Encryption for Secure Multimedia Data Sharing on Mobile Devices., , , , , , and . ICME, page 1-6. IEEE, (2024)