Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A comprehensive survey on robust image watermarking., , , , , and . Neurocomputing, (2022)Optimizing ordered graph algorithms with GraphIt., , , , , , and . CGO, page 158-170. ACM, (2020)Compiling Graph Applications for GPU s with GraphIt., , , , , and . CGO, page 248-261. IEEE, (2021)Taming the Zoo: The Unified GraphIt Compiler Framework for Novel Architectures., , , , , , , , , and 4 other author(s). ISCA, page 429-442. IEEE, (2021)Dual Defense: Adversarial, Traceable, and Invisible Robust Watermarking against Face Swapping., , , , , , and . CoRR, (2023)Once and for All: Universal Transferable Adversarial Perturbation against Deep Hashing-Based Facial Image Retrieval., , , , and . AAAI, page 5136-5144. AAAI Press, (2024)Efficient Stepping Algorithms and Implementations for Parallel Shortest Paths., , , and . SPAA, page 184-197. ACM, (2021)Optimizing Cache Performance for Graph Analytics., , , , and . CoRR, (2016)Compliation Techniques for Graphs Algorithms on GPUs., , , , , and . CoRR, (2020)Double Privacy Guard: Robust Traceable Adversarial Watermarking against Face Recognition., , , , , , and . CoRR, (2024)