Author of the publication

Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations.

, , , and . IEEE Symposium on Security and Privacy Workshops, page 43-49. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Fast Handover Mechanisms for Hierarchical Mobile IPv6 Network Mobility., , and . Wireless Personal Communications, 48 (2): 215-238 (2009)Optimal Pricing and Workforce Composition for Service Delivery Using a Hybrid Workforce (Research in Progress)., , and . WEB, volume 296 of Lecture Notes in Business Information Processing, page 67-73. Springer, (2016)A New Hard-Core Predicate of Paillier's Trapdoor Function., and . INDOCRYPT, volume 5922 of Lecture Notes in Computer Science, page 263-271. Springer, (2009)Development of a FBG Based Hoop-Strain Sensor Using 3D Printing Method., , , and . IEEE Access, (2019)Differentially Private K-Means Clustering., , , , and . CODASPY, page 26-37. ACM, (2016)Construction of Unsupervised Prose Text Emotional Lexicon Based on Multidimensional Fusion., , and . TRIDENTCOM, volume 380 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 134-145. Springer, (2020)Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations., , , and . IEEE Symposium on Security and Privacy Workshops, page 43-49. IEEE, (2019)A Benchmarking Model for Management of Knowledge-Intensive Service Delivery Networks., , and . J. Manag. Inf. Syst., 28 (3): 127-160 (2012)Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach., , , , , , , and . ICLR (Poster), OpenReview.net, (2018)PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets., , , , , , and . WWW, page 594-604. ACM, (2019)