From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification., и . ACSAC, стр. 278-287. ACM, (2017)Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN), , , , , , , и . CoRR, (2011)EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis., , , и . ACM Conference on Computer and Communications Security, стр. 1338-1350. ACM, (2018)Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework., , , , и . CIKM, стр. 1111-1120. ACM, (2015)Forgery-Resistant Touch-based Authentication on Mobile Devices., , , и . AsiaCCS, стр. 499-510. ACM, (2016)Linear-Time Self Attention with Codeword Histogram for Efficient Recommendation., , , , , , и . WWW, стр. 1262-1273. ACM / IW3C2, (2021)FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping., , , и . NDSS, The Internet Society, (2021)Data Poisoning Attacks to Deep Learning Based Recommender Systems., , , , , и . NDSS, The Internet Society, (2021)Attacking Graph-based Classification via Manipulating the Graph Structure., и . ACM Conference on Computer and Communications Security, стр. 2023-2040. ACM, (2019)HERO: hessian-enhanced robust optimization for unifying and improving generalization and quantization performance., , , и . DAC, стр. 25-30. ACM, (2022)