Author of the publication

GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MLGL: Model-free Lesion Generation and Learning for Diabetic Retinopathy Diagnosis., , , , , , and . BIBM, page 1266-1271. IEEE, (2023)Multi-Siamese networks to accurately match contactless to contact-based fingerprint images., and . IJCB, page 277-285. IEEE, (2017)SenseMood: Depression Detection on Social Media., , , , , , and . ICMR, page 407-411. ACM, (2020)GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning., , , , , and . CoRR, (2023)KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems., , , , , , and . USENIX Security Symposium, page 247-264. USENIX Association, (2023)Physical 3D Adversarial Attacks against Monocular Depth Estimation in Autonomous Driving., , , , , and . CoRR, (2024)A Surrogate-Based Optimization Method for Solving Economic Emission Dispatch Problems with Green Certificate Trading and Wind Power., , , , and . BIC-TA (1), volume 2061 of Communications in Computer and Information Science, page 29-43. Springer, (2023)Deepfake Detection Performance Evaluation and Enhancement Through Parameter Optimization., , , , and . ICAI (2), volume 2015 of Communications in Computer and Information Science, page 202-213. Springer, (2023)Spatial Dual-Modality Graph Reasoning for Key Information Extraction., , , , and . CoRR, (2021)Exploiting Facial Relationships and Feature Aggregation for Multi-Face Forgery Detection., , , , , and . CoRR, (2023)