Author of the publication

A two-stage model extraction attack on GANs with a small collected dataset.

, , , and . Comput. Secur., (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical Treatment of Stokes Solvent Flow and Solute-Solvent Interfacial Dynamics for Nonpolar Molecules., , , , and . J. Sci. Comput., 67 (2): 705-723 (2016)Angle-based Multicategory Distance-weighted SVM., , and . J. Mach. Learn. Res., (2017)Firefly algorithm with generalised opposition-based learning., , and . Int. J. Wirel. Mob. Comput., 9 (4): 370-376 (2015)Dynamic load balance strategy for parallel rendering based on deferred shading., , and . Int. J. Comput. Sci. Eng., 18 (3): 286-293 (2019)Alleviating knowledge contribution loafing among engineering designers by ethical leadership: the role of knowledge-based psychological ownership and emotion regulation strategies., , and . J. Knowl. Manag., 24 (2): 235-257 (2020)Spatiotemporal Interaction Residual Networks with Pseudo3D for Video Action Recognition., , , , , , and . Sensors, 20 (11): 3126 (2020)A New Memristor-Based 5D Chaotic System and Circuit Implementation., , , and . Complex., (2018)Hysteresis and Linear Stability Analysis on Multiple Steady-State Solutions to the Poisson-Nernst-Planck equations with Steric Interactions., , and . CoRR, (2020)Enhanced beetle antennae search algorithm for complex and unbiased optimization., , , , , , , and . Soft Comput., 26 (19): 10331-10369 (2022)Design of a Secure Medical Data Sharing Scheme Based on Blockchain., , , , and . J. Medical Syst., 44 (2): 52 (2020)