From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CloudLeak: Large-Scale Deep Learning Models Stealing Through Adversarial Examples., , , , , и . NDSS, The Internet Society, (2020)LLM4SecHW: Leveraging Domain-Specific Large Language Model for Hardware Debugging., , , , и . AsianHOST, стр. 1-6. IEEE, (2023)Robust Adversarial Objects against Deep Learning Models., , , и . AAAI, стр. 954-962. AAAI Press, (2020)Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis., , , , , , и . HOST, стр. 144-154. IEEE, (2023)3D-Adv: Black-Box Adversarial Attacks against Deep Learning Models through 3D Sensors., , , , и . DAC, стр. 547-552. IEEE, (2021)Adversarial Examples Against the Deep Learning Based Network Intrusion Detection Systems., , , и . MILCOM, стр. 559-564. IEEE, (2018)DeepEM: Deep Neural Networks Model Recovery through EM Side-Channel Information Leakage., , , , и . HOST, стр. 209-218. IEEE, (2020)Graph Neural Network based Hardware Trojan Detection at Intermediate Representative for SoC Platforms., , , , , , и . ACM Great Lakes Symposium on VLSI, стр. 481-486. ACM, (2022)Beyond Digital Domain: Fooling Deep Learning Based Recognition System in Physical World., , , , и . AAAI, стр. 1088-1095. AAAI Press, (2020)Practical private information retrieval supporting keyword search in the cloud., , , и . WCSP, стр. 1-6. IEEE, (2014)