Author of the publication

Label Inference Attacks Against Vertical Federated Learning.

, , , , , , , , and . USENIX Security Symposium, page 1397-1414. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An integrated platform for collecting mobile phone data and learning demographic features., , and . PerCom Workshops, page 30-33. IEEE, (2017)AdaCCD: Adaptive Semantic Contrasts Discovery based Cross Lingual Adaptation for Code Clone Detection., , , , and . CoRR, (2023)Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting., , , and . CCS, page 90-104. ACM, (2023)CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels., , , , , , , , and . CCS, page 794-810. ACM, (2021)ScalScheduling: A Scalable Scheduling Architecture for MPI-based interactive analysis programs., , , and . ICCCN, page 1-8. IEEE, (2014)Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings., , , , , , , , , and . SP, page 1423-1439. IEEE, (2022)DataNet: A Data Distribution-Aware Method for Sub-Dataset Analysis on Distributed File Systems., , , , and . IPDPS, page 504-513. IEEE Computer Society, (2016)UNIO: A Unified I/O System Framework for Hybrid Scientific Workflow., , , , , and . CloudCom-Asia, volume 9106 of Lecture Notes in Computer Science, page 99-114. Springer, (2015)Learning Human Motion Prediction via Stochastic Differential Equations., , , , , and . ACM Multimedia, page 4976-4984. ACM, (2021)Tram: A Token-level Retrieval-augmented Mechanism for Source Code Summarization., , , , , , , and . NAACL-HLT (Findings), page 2959-2971. Association for Computational Linguistics, (2024)