Author of the publication

Poisoning Attacks on Fair Machine Learning.

, , , and . DASFAA (1), volume 13245 of Lecture Notes in Computer Science, page 370-386. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DMFSGD: A Decentralized Matrix Factorization Algorithm for Network Distance Prediction., , , and . IEEE/ACM Trans. Netw., 21 (5): 1511-1524 (2013)A novel multi-stage feature selection method for microarray expression data analysis., , , , , and . IJDMB, 7 (1): 58-77 (2013)Identification of essential proteins based on ranking edge-weights in protein-protein interaction networks., , , , , , and . PloS one, (2014)Differential snapshot algorithms based on Hadoop MapReduce., and . FSKD, page 1203-1208. IEEE, (2015)A Topic Sensitive SimRank (Tssr) Model for Experts Finding on Online Research Social Platforms., , , , , and . PACIS, page 306. (2016)Sequential variational inference for distributed multi-sensor tracking and fusion., and . FUSION, page 1-7. IEEE, (2007)Content-based music similarity computation with relevant component analysis., , , , and . CISP-BMEI, page 1043-1047. IEEE, (2016)An Uncertainty Enhanced Trust Evolution Strategy for e-Science., , and . J. Comput. Sci. Technol., 25 (6): 1225-1236 (2010)Establishing interoperability among knowledge organization systems for research management: a social network approach., , , , and . Scientometrics, 112 (3): 1489-1506 (2017)Soft Subspace Clustering with a Multi-objective Evolutionary Approach., , , , , , , and . ICVISP, page 70:1-70:5. ACM, (2018)