Author of the publication

Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints.

, , , , , , , and . MSN, page 178-185. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Partially Supervised Text Classification with Multi-Level Examples., , , , and . AAAI, page 890-895. AAAI Press, (2011)Protecting Facial Privacy: Generating Adversarial Identity Masks via Style-robust Makeup Transfer., , , , , , and . CVPR, page 14994-15003. IEEE, (2022)Development of a simple disposable laser-induced porous graphene flexible electrode for portable wireless intelligent votammetric nanosensing of salicylic acid in agro-products., , , , , , , and . Comput. Electron. Agric., (2021)Research on MAC Communication Mechanism of Air-to-Ground Data Link Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake Mechanism., , and . IITSI, page 54-57. IEEE Computer Society, (2010)Multi-level knowledge representation and retrieval of complex product design based on BOM., , , and . CSCWD, page 226-230. IEEE, (2014)Preserving Privacy of Input Features Across All Stages of Collaborative Learning., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 191-198. IEEE, (2023)AdvHash: Set-to-set Targeted Attack on Deep Hashing with One Single Adversarial Patch., , , , , and . ACM Multimedia, page 2335-2343. ACM, (2021)The Effectiveness Study of Local Maximum Feature for Chinese Unknown Word Identification., , , and . J. Chin. Lang. Comput., 17 (1): 15-26 (2007)A Four-Pronged Defense Against Byzantine Attacks in Federated Learning., , , , , , and . ACM Multimedia, page 7394-7402. ACM, (2023)Transferable Adversarial Facial Images for Privacy Protection., , , , , and . CoRR, (2024)