From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptanalyzing a class of image encryption schemes based on Chinese remainder theorem., , , и . Signal Process. Image Commun., 29 (8): 914-920 (2014)Design and Analysis on a Parallel Chaos-Based Hash Function., , , и . Int. J. Bifurc. Chaos, 30 (13): 2050188:1-2050188:18 (2020)Static malware clustering using enhanced deep embedding method., , , и . Concurr. Comput. Pract. Exp., (2019)PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data., , , , , , и . IEEE Trans. Cloud Comput., 11 (3): 2379-2391 (июля 2023)Downstream-agnostic Adversarial Examples., , , , , , и . ICCV, стр. 4322-4332. IEEE, (2023)Backdoor Attacks and Generative Model Fairness: Current Trends and Future Research Directions., , , и . COMSNETS, стр. 31-36. IEEE, (2024)Towards Privacy-Preserving Neural Architecture Search., , , , и . ISCC, стр. 1-6. IEEE, (2022)PointCA: Evaluating the Robustness of 3D Point Cloud Completion Models against Adversarial Examples., , , , , , , и . AAAI, стр. 872-880. AAAI Press, (2023)Revisiting Gradient Pruning: A Dual Realization for Defending against Gradient Attacks., , , , , , и . AAAI, стр. 6404-6412. AAAI Press, (2024)Shielding Federated Learning: A New Attack Approach and Its Defense., , , , и . WCNC, стр. 1-7. IEEE, (2021)