Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs., , , , and . SP, page 2977-2995. IEEE, (2024)Attacks and Defenses in Location-Based Social Networks: A Heuristic Number Theory Approach., , , , and . SocialSec, page 64-71. IEEE Computer Society, (2015)StyleFool: Fooling Video Classification Systems via Style Transfer., , , , , and . SP, page 1631-1648. IEEE, (2023)Detecting Union Type Confusion in Component Object Model., , , , , , , and . USENIX Security Symposium, page 4265-4281. USENIX Association, (2023)dp-promise: Differentially Private Diffusion Probabilistic Models for Image Synthesis., , , , , and . USENIX Security Symposium, USENIX Association, (2024)Unleash the Power for Tensor: A Hybrid Malware Detection System Using Ensemble Classifiers., , and . ISPA/IUCC, page 1130-1137. IEEE, (2017)A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services., , , , , , , and . NDSS, The Internet Society, (2024)RAI2: Responsible Identity Audit Governing the Artificial Intelligence., , , , , and . NDSS, The Internet Society, (2023)The "Code" of Ethics: A Holistic Audit of AI Code Generators., , , , and . IEEE Trans. Dependable Secur. Comput., 21 (5): 4997-5013 (September 2024)Thwarting location privacy protection in location-based social discovery services., , , and . Secur. Commun. Networks, 9 (11): 1496-1508 (2016)