From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Making Neural Programming Architectures Generalize via Recursion., , и . ICLR, OpenReview.net, (2017)BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning., , , , , и . IJCAI, стр. 3699-3705. ijcai.org, (2021)Adversarial Collaborative Learning on Non-IID Features., , и . ICML, том 202 из Proceedings of Machine Learning Research, стр. 19504-19526. PMLR, (2023)Opaak: using mobile phones to limit anonymous identities online., , , и . MobiSys, стр. 295-308. ACM, (2012)CHURP: Dynamic-Committee Proactive Secret Sharing., , , , , , и . CCS, стр. 2369-2386. ACM, (2019)A Principled Approach to Data Valuation for Federated Learning., , , , и . Federated Learning, том 12500 из Lecture Notes in Computer Science, Springer, (2020)Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection., , , , , и . CCS, стр. 363-376. ACM, (2017)Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing., , , , , , , , , и . CCS, стр. 1871-1885. ACM, (2022)Perturbation type categorization for multiple adversarial perturbation robustness., , , и . UAI, том 180 из Proceedings of Machine Learning Research, стр. 1317-1327. PMLR, (2022)The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks., , , , и . USENIX Security Symposium, стр. 267-284. USENIX Association, (2019)