Author of the publication

Categorical Inference Poisoning: Verifiable Defense Against Black-Box DNN Model Stealing Without Constraining Surrogate Data and Query Times.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reconstructing Satellite-Based Monthly Precipitation over Northeast China Using Machine Learning Algorithms., , , and . Remote Sensing, 9 (8): 781 (2017)A self-stabilizing algorithm for optimally efficient sets in graphs., , , , and . Inf. Process. Lett., 112 (16): 621-623 (2012)A Bimodal Biometric Verification System Based on Deep Learning., , , and . ICVIP, page 89-93. ACM, (2017)Extending CDFR for Overlapping Community Detection., , , , and . ICDIS, page 200-206. IEEE, (2018)Geographic Pattern Routing for MANETOR in IVC., , , and . ADHOC-NOW, volume 4104 of Lecture Notes in Computer Science, page 156-169. Springer, (2006)Automatic Recognition of Spicules in Mammograms., , , and . ICIAP (2), volume 1311 of Lecture Notes in Computer Science, page 396-403. Springer, (1997)Linear Programming for Matching in Human Body Gesture Recognition., , and . AMFG, volume 3723 of Lecture Notes in Computer Science, page 392-406. Springer, (2005)Nondiagonal color correction., and . ICIP (1), page 481-484. IEEE, (2003)Model-free control for soft manipulators based on reinforcement learning., , , , , , and . IROS, page 2909-2915. IEEE, (2017)Tactile sensing for gecko-inspired adhesion., , , , , , and . IROS, page 1501-1507. IEEE, (2015)