Author of the publication

Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework.

, , , , , and . ACM Trans. Intell. Syst. Technol., 14 (4): 58:1-58:25 (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient biometric identity-based encryption., , , and . Inf. Sci., (2018)Blind Night-Time Image Quality Assessment: Subjective and Objective Approaches., , and . IEEE Trans. Multim., 22 (5): 1259-1272 (2020)Text's Armor: Optimized Local Adversarial Perturbation Against Scene Text Editing Attacks., , , , and . ACM Multimedia, page 2777-2785. ACM, (2022)Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models., , , , , and . IJCAI, page 3635-3641. ijcai.org, (2021)Extracting Robust Models with Uncertain Examples., , , , , and . ICLR, OpenReview.net, (2023)Text Classification via Large Language Models., , , , , , and . EMNLP (Findings), page 8990-9005. Association for Computational Linguistics, (2023)Towards efficient privacy-preserving face recognition in the cloud., , and . Signal Process., (2019)Automatic Transformation Search Against Deep Leakage From Gradients., , , , , , , and . IEEE Trans. Pattern Anal. Mach. Intell., 45 (9): 10650-10668 (September 2023)What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks., , , , , , , and . ICCV, page 4986-4996. IEEE, (2023)MERCURY: An Automated Remote Side-channel Attack to Nvidia Deep Learning Accelerator., , , , , , and . ICFPT, page 188-197. IEEE, (2023)