Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain Approach., , , , , and . TrustCom, page 402-409. IEEE, (2020)Shielding Federated Learning: Mitigating Byzantine Attacks with Less Constraints., , , , , , , and . MSN, page 178-185. IEEE, (2022)Towards Model Extraction Attacks in GAN-Based Image Translation via Domain Shift Mitigation., , , , , , and . AAAI, page 19902-19910. AAAI Press, (2024)SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display., , , , , and . RAID, page 686-699. ACM, (2023)Data Analytics of Crowdsourced Resources for Cybersecurity Intelligence., , , , , and . NSS, volume 12570 of Lecture Notes in Computer Science, page 3-21. Springer, (2020)A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks., , , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 406-425. Springer, (2022)Buffeting Chaotification Model for Enhancing Chaos and Its Hardware Implementation., , , , and . IEEE Trans. Ind. Electron., 70 (3): 2916-2926 (2023)A New Rabin-Type Cryptosystem with Modulus p2q., , and . ATIS, volume 1338 of Communications in Computer and Information Science, page 61-77. Springer, (2020)Fluent: Round-efficient Secure Aggregation for Private Federated Learning., , , , , and . CoRR, (2024)Detecting and Mitigating Backdoor Attacks with Dynamic and Invisible Triggers., , and . ICONIP (3), volume 13625 of Lecture Notes in Computer Science, page 216-227. Springer, (2022)