Author of the publication

Learning to Attack Federated Learning: A Model-based Reinforcement Learning Attack Framework.

, , and . NeurIPS, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably delay efficient data retrieving in storage clouds., , , , and . INFOCOM, page 585-593. IEEE, (2015)Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks., , , and . INFOCOM, page 136-144. IEEE, (2009)Online multi-resource allocation for deadline sensitive jobs with partial values in the cloud., and . INFOCOM, page 1-9. IEEE, (2016)Towards Automatic Detection of Nonfunctional Sensitive Transmissions in Mobile Applications., , , , , , , and . IEEE Trans. Mob. Comput., 20 (10): 3066-3080 (2021)On the efficiency-vs-security tradeoff in the smart grid., , , and . CDC, page 1954-1959. IEEE, (2012)An Online Algorithm for Power-Proportional Data Centers with Switching Cost., , and . CDC, page 6025-6032. IEEE, (2018)Networked beamforming in dense mmWave WLANs., , , and . HotMobile, page 102-108. ACM, (2022)Online Learning for Adaptive Probing and Scheduling in Dense WLANs., , and . INFOCOM, page 1-10. IEEE, (2023)Enhancing LLM Safety via Constrained Direct Preference Optimization., , and . CoRR, (2024)Maximizing system throughput using cooperative sensing in multi-channel cognitive radio networks., , , and . CDC, page 5858-5863. IEEE, (2012)