Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof-of-Contribution-Based Design for Collaborative Machine Learning on Blockchain., , , , , , , and . DAPPS, page 13-22. IEEE, (2023)SVM-HMM Based Human Behavior Recognition., , , and . HCC, volume 8944 of Lecture Notes in Computer Science, page 93-103. Springer, (2014)FedSecurity: A Benchmark for Attacks and Defenses in Federated Learning and Federated LLMs., , , , , , , , , and 6 other author(s). KDD, page 5070-5081. ACM, (2024)Kick Bad Guys Out! Zero-Knowledge-Proof-Based Anomaly Detection in Federated Learning., , , , , , , and . CoRR, (2023)Research on the Teaching Method of Combining the Theory and Practice in Data Structure Course., , and . ICYCS, page 2501-2506. IEEE Computer Society, (2008)TorchOpera: A Compound AI System for LLM Safety., , , , , and . CoRR, (2024)ScaleLLM: A Resource-Frugal LLM Serving Framework by Optimizing End-to-End Efficiency., , , , , , , , , and . CoRR, (2024)The Study of Improved Grid Resource Scheduling Algorithm., , , and . ICICA (LNCS), volume 7030 of Lecture Notes in Computer Science, page 391-398. Springer, (2011)Learning shape and texture progression for young child face aging., , , , and . Signal Process. Image Commun., (2021)QUEST: Privacy-Preserving Monitoring of Network Data., , , , , , and . SERVICES, page 21. IEEE, (2022)