Author of the publication

BlockFed: A High-Performance and Trustworthy Blockchain-Based Federated Learning Framework.

, , , , and . GLOBECOM, page 892-897. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrojanFlow: A Neural Backdoor Attack to Deep Learning-based Network Traffic Classifiers., , and . INFOCOM, page 1429-1438. IEEE, (2022)CLEAR: Clean-up Sample-Targeted Backdoor in Neural Networks., , , , and . ICCV, page 16433-16442. IEEE, (2021)ACADIA: Efficient and Robust Adversarial Attacks Against Deep Reinforcement Learning., , , , , , and . CNS, page 1-9. IEEE, (2022)Optimizing the heterogeneous network on-chip design in manycore architectures., , , , and . SoCC, page 184-189. IEEE, (2017)CapJack: Capture In-Browser Crypto-jacking by Deep Capsule Network through Behavioral Analysis., , , , , and . INFOCOM, page 1873-1881. IEEE, (2019)SEER: Backdoor Detection for Vision-Language Models through Searching Target Text and Image Trigger Jointly., , , , and . AAAI, page 7766-7774. AAAI Press, (2024)SPOT: Structure Patching and Overlap Tweaking for Effective Pipelining in Privacy-Preserving MLaaS with Tiny Clients., , , , and . ICDCS, page 1318-1329. IEEE, (2024)Demo Abstract: Toward the Convergence of the Next-Generation Wireless and AI., , , and . INFOCOM (Workshops), page 1-6. IEEE, (2024)Invisible Poison: A Blackbox Clean Label Backdoor Attack to Deep Neural Networks., , , and . INFOCOM, page 1-10. IEEE, (2021)DeepMag+: Sniffing mobile apps in magnetic field through deep learning., , , , and . Pervasive Mob. Comput., (2020)