Author of the publication

Generating Privacy-preserving Educational Data Records with Diffusion Model.

, , , , , , , and . WWW (Companion Volume), page 806-809. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast and Effective Global Covariance Pooling Network for Image Steganalysis., , , and . IH&MMSec, page 230-234. ACM, (2019)Generalized Linear Integer Numeric Planning., , , , , and . ICAPS, page 241-251. AAAI Press, (2022)Detection of Quantization Artifacts and Its Applications to Transform Encoder Identification., , and . IEEE Trans. Inf. Forensics Secur., 5 (4): 810-815 (2010)Adversarial Steganography Embedding via Stego Generation and Selection., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 2375-2389 (May 2023)Knowledge Tracing Model with Learning and Forgetting Behavior., , , , , and . CIKM, page 3863-3867. ACM, (2022)KG4Ex: An Explainable Knowledge Graph-Based Approach for Exercise Recommendation., , , , , , and . CIKM, page 597-607. ACM, (2023)Enhancing Image Steganography Via Stego Generation And Selection., , , and . ICASSP, page 2695-2699. IEEE, (2021)SDGAN: Disentangling Semantic Manipulation for Facial Attribute Editing., , , and . AAAI, page 2374-2381. AAAI Press, (2024)Fake Faces Identification via Convolutional Neural Network., , and . IH&MMSec, page 43-47. ACM, (2018)Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution Decomposition., , and . TrustCom, page 1592-1597. IEEE, (2023)