From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A WiFi RSSI ranking fingerprint positioning system and its application to indoor activities of daily living recognition., , и . IJDSN, (2019)Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks., , , , , , и . CIKM, стр. 3617-3621. ACM, (2021)Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification., , , , , и . CoRR, (2023)Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information., , , , , , и . USENIX Security Symposium, стр. 1181-1198. USENIX Association, (2023)Adapting Membership Inference Attacks to GNN for Graph Classification: Approaches and Implications., , , и . ICDM, стр. 1421-1426. IEEE, (2021)WiFi Fingerprint Based, Indoor, Location-Driven Activities of Daily Living Recognition., , , и . BESC, стр. 148-151. IEEE, (2018)Gradient Transformation: Towards Efficient and Model-Agnostic Unlearning for Dynamic Graph Neural Networks., , , , , и . CoRR, (2024)GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks., , , , , , и . NDSS, The Internet Society, (2024)DeFiGuard: A Price Manipulation Detection Service in DeFi using Graph Neural Networks., , , , , и . CoRR, (2024)GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks., , , , , , и . CoRR, (2023)