Author of the publication

Where to Attack: A Dynamic Locator Model for Backdoor Attack in Text Classifications.

, , , , , and . COLING, page 984-993. International Committee on Computational Linguistics, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-free Dense Depth Distillation., , , , and . CoRR, (2022)Learn2Agree: Fitting with Multiple Annotators Without Objective Ground Truth., , , , , , and . TML4H, volume 13932 of Lecture Notes in Computer Science, page 147-162. Springer, (2023)Trajectory Prediction with Contrastive Pre-training and Social Rank Fine-Tuning., , , and . ICONIP (10), volume 1964 of Communications in Computer and Information Science, page 535-550. Springer, (2023)Federated Few-Shot Learning with Adversarial Learning., and . WiOpt, page 264-271. IFIP, (2021)Federated Generative Adversarial Learning., and . PRCV (3), volume 12307 of Lecture Notes in Computer Science, page 3-15. Springer, (2020)AgreementLearning: An End-to-End Framework for Learning with Multiple Annotators without Groundtruth., , , , , , and . CoRR, (2021)Forecasting Hand and Object Locations in Future Frames., , and . CoRR, (2017)Boosting Light-Weight Depth Estimation Via Knowledge Distillation., , , , , and . CoRR, (2021)Where to Attack: A Dynamic Locator Model for Backdoor Attack in Text Classifications., , , , , and . COLING, page 984-993. International Committee on Computational Linguistics, (2022)Forecasting Hands and Objects in Future Frames., , and . ECCV Workshops (3), volume 11131 of Lecture Notes in Computer Science, page 124-137. Springer, (2018)