Author of the publication

Efficient Top-k Matching for Publish/Subscribe Ride Hitching.

, , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (4): 3808-3821 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Blockchain-Based Mutual Authentication Protocol for Smart Home., , , , and . ISC, volume 13640 of Lecture Notes in Computer Science, page 250-265. Springer, (2022)Stealing Deep Reinforcement Learning Models for Fun and Profit., , , , and . AsiaCCS, page 307-319. ACM, (2021)Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption., , , , and . CoRR, (2022)DPG-Net: Densely progressive-growing network for point cloud completion., , , , and . Neurocomputing, (2022)Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework., , , , , and . ACM Trans. Intell. Syst. Technol., 14 (4): 58:1-58:25 (August 2023)Efficient Top-k Matching for Publish/Subscribe Ride Hitching., , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (4): 3808-3821 (April 2023)Fingerprinting Image-to-Image Generative Adversarial Networks., , , , , , , and . EuroS&P, page 41-61. IEEE, (2024)Triggerless Backdoor Attack for NLP Tasks with Clean Labels., , , , , , , , and . NAACL-HLT, page 2942-2952. Association for Computational Linguistics, (2022)TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability., , , , , and . CoRR, (2024)DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation., , , , , and . CoRR, (2020)