Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Quantum Communication Protocol Using Insecure Public Channels., , , and . SEC, volume 181 of IFIP, page 113-126. Springer, (2005)Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 9 (1): 109-124 (2014)Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications., , , and . IEEE Access, (2020)A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks., , and . SECON, page 1-9. IEEE, (2009)Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?, , , , , , , , and . CoRR, (2023)Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning., , , , and . AAAI, page 6926-6934. AAAI Press, (2022)Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment., , , , and . ICDCS Workshops, page 18. IEEE Computer Society, (2007)Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release., , , , , , and . AINA, page 1130-1137. IEEE Computer Society, (2017)Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models., , , , , and . CoRR, (2024)Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective., , , , , and . ICLR, OpenReview.net, (2024)