Author of the publication

SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.

, , , , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 610-630. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantifying and Defending against Privacy Threats on Federated Knowledge Graph Embedding., , , , , , , and . WWW, page 2306-2317. ACM, (2023)Cloud-Enabled Privacy-Preserving Truth Discovery in Crowd Sensing Systems., , , , , , , , and . SenSys, page 183-196. ACM, (2015)An Efficient Two-Layer Mechanism for Privacy-Preserving Truth Discovery., , , , , , , and . KDD, page 1705-1714. ACM, (2018)Malicious URL Detection via Pretrained Language Model Guided Multi-Level Feature Attention Network., , , , , and . CoRR, (2023)Secure Prediction of Neural Network in the Cloud., , , , , and . IEEE Netw., 35 (1): 251-257 (2021)Equitable Data Valuation Meets the Right to Be Forgotten in Model Markets., , , , , , and . Proc. VLDB Endow., 16 (11): 3349-3362 (2023)Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3390-3405 (July 2024)RemovalNet: DNN Fingerprint Removal Attacks., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 2645-2658 (July 2024)Flood modeling and inundation risk evaluation using remote sensing imagery in coastal zone of China., , , , , , and . IGARSS, page 903-906. IEEE, (2012)Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data., , , , and . IEEE Trans. Image Processing, 25 (7): 3411-3425 (2016)