Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification., and . ACSAC, page 278-287. ACM, (2017)Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN), , , , , , , and . CoRR, (2011)Attacking Graph-based Classification via Manipulating the Graph Structure., and . ACM Conference on Computer and Communications Security, page 2023-2040. ACM, (2019)EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis., , , and . ACM Conference on Computer and Communications Security, page 1338-1350. ACM, (2018)Forgery-Resistant Touch-based Authentication on Mobile Devices., , , and . AsiaCCS, page 499-510. ACM, (2016)Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework., , , , and . CIKM, page 1111-1120. ACM, (2015)Linear-Time Self Attention with Codeword Histogram for Efficient Recommendation., , , , , , and . WWW, page 1262-1273. ACM / IW3C2, (2021)HERO: hessian-enhanced robust optimization for unifying and improving generalization and quantization performance., , , and . DAC, page 25-30. ACM, (2022)A Transfer Attack to Image Watermarks., , , and . CoRR, (2024)Watermark-based Detection and Attribution of AI-Generated Content., , , and . CoRR, (2024)