Author of the publication

ML defense: against prediction API threats in cloud-based machine learning service.

, , , , , and . IWQoS, page 7:1-7:10. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ViRED: Prediction of Visual Relations in Engineering Drawings., , , , and . CoRR, (2024)Job Scheduling Under Differential Pricing: Hardness and Approximation Algorithms., , , , and . WASA, volume 10251 of Lecture Notes in Computer Science, page 641-652. Springer, (2017)Model Protection: Real-Time Privacy-Preserving Inference Service for Model Privacy at the Edge., , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (6): 4270-4284 (2022)Accurately Identify and Localize Commodity Devices from Encrypted Smart Home Traffic., , , , , and . MSN, page 663-670. IEEE, (2022)User-Demand-Oriented Privacy-Preservation in Video Delivering., , , , , and . MSN, page 145-151. IEEE Computer Society, (2016)Data Protection: Privacy-Preserving Data Collection With Validation., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3422-3438 (July 2024)BackLip: Passphrase-Independent Lip-reading User Authentication with Backscatter Signals., , , , , , and . IWQoS, page 1-10. IEEE, (2023)Efficient Object-grained Video Inpainting with Personalized Recovery and Permission Control., , , , and . IWQoS, page 1-10. IEEE, (2024)ML defense: against prediction API threats in cloud-based machine learning service., , , , , and . IWQoS, page 7:1-7:10. ACM, (2019)AccountTrade: Accountable protocols for big data trading against dishonest consumers., , , , , , , and . INFOCOM, page 1-9. IEEE, (2017)