Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack., , , , , and . CoRR, (2020)Adversarial Example Attacks and Defenses in DNS Data Exfiltration., , , and . EISA, volume 2004 of Communications in Computer and Information Science, page 147-163. Springer, (2023)WAS-VTON: Warping Architecture Search for Virtual Try-on Network., , , , , , and . ACM Multimedia, page 3350-3359. ACM, (2021)PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis., , , , , , and . GLOBECOM, page 1-6. IEEE, (2019)RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks., , , , , , and . CoRR, (2023)ARCANE: An Efficient Architecture for Exact Machine Unlearning., , , , , and . IJCAI, page 4006-4013. ijcai.org, (2022)Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense., , , and . AIS&P (1), volume 14509 of Lecture Notes in Computer Science, page 237-252. Springer, (2023)Dap-FL: Federated Learning flourishes by adaptive tuning and secure aggregation., , , , and . CoRR, (2022)ndnShare: File Sharing Application Based on NFD-Android., , , and . ICN, page 165-166. ACM, (2019)Application and Implementation of Convolutional Neural Network Accelerator Based on FPGA in Environmental Sound Classification., and . ICCCS, page 22-27. IEEE, (2023)