Author of the publication

Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?

, , , , , , , , and . ACM Multimedia, page 1808-1818. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Challenges and Solutions in Vectored DSL., , , , and . AccessNets, volume 37 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 192-203. Springer, (2009)DSM from Theory to Practice., , , , , and . GLOBECOM, page 5693-5696. IEEE, (2008)Privacy Protection for Medical Data Sharing in Smart Healthcare., , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (3s): 100:1-100:18 (2020)Data protection based on multifunction digital watermark in wireless sensor network., , , and . ICCST, page 37-41. IEEE, (2015)Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic., , , , , , and . WWW, page 1991-1999. ACM, (2023)MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage., , , , , , , , , and . PST, page 1-11. IEEE, (2023)Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds., , , , , and . ACM TUR-C, page 164-165. ACM, (2023)Hawkes-Enhanced Spatial-Temporal Hypergraph Contrastive Learning Based on Criminal Correlations., , , , , , , , and . AAAI, page 8733-8741. AAAI Press, (2024)Oriented Group Provable Data Possession in Public Cloud., , , and . IIH-MSP, page 775-778. IEEE, (2014)Attributed Based Provable Data Possession in Public Cloud Storage., , , and . IIH-MSP, page 710-713. IEEE, (2014)