From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TextBugger: Generating Adversarial Text Against Real-world Applications., , , , и . CoRR, (2018)The Dark Side of AutoML: Towards Architectural Backdoor Search., , , , и . CoRR, (2022)Investigating Pose Representations and Motion Contexts Modeling for 3D Motion Prediction., , , , , , и . IEEE Trans. Pattern Anal. Mach. Intell., 45 (1): 681-697 (2023)All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning., , , , и . CoRR, (2022)AdaCCD: Adaptive Semantic Contrasts Discovery based Cross Lingual Adaptation for Code Clone Detection., , , , и . CoRR, (2023)A Practical Black-Box Attack on Source Code Authorship Identification Classifiers., , , и . IEEE Trans. Inf. Forensics Secur., (2021)Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning., , , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (5): 3653-3668 (сентября 2023)ACT-Detector: Adaptive channel transformation-based light-weighted detector for adversarial attacks., , , , и . Inf. Sci., (2021)Exploiting Heterogeneous Graph Neural Networks with Latent Worker/Task Correlation Information for Label Aggregation in Crowdsourcing., , , , и . ACM Trans. Knowl. Discov. Data, 16 (2): 27:1-27:18 (2022)CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels., , , , , , , , и . CCS, стр. 794-810. ACM, (2021)