Author of the publication

Characterizing Internal Evasion Attacks in Federated Learning.

, , , and . AISTATS, volume 206 of Proceedings of Machine Learning Research, page 907-921. PMLR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource-aware sector translation layer for resource-sensitive nand flash-based storage systems., , , and . IEEE Trans. Consumer Electron., 58 (2): 462-469 (2012)Hierarchical data structure-based timing controller design for plasma display panels., , , , , , and . ISCAS, page 4121-4124. IEEE, (2010)PCStream: Automatic Stream Allocation Using Program Contexts., , , , , and . HotStorage, USENIX Association, (2018)Characterizing Internal Evasion Attacks in Federated Learning., , , and . AISTATS, volume 206 of Proceedings of Machine Learning Research, page 907-921. PMLR, (2023)TDR-based pipe leakage detection and location using Bayesian inference., , , and . ICPHM, page 1-5. IEEE, (2015)Design issues and optimization in DisplayPort link layer implementation., , and . APCCAS, page 188-191. IEEE, (2010)RETE-ADH: An Improvement to RETE for Composite Context-Aware Service., , , , , , and . IJDSN, (2014)Online thermal state estimation of high power lithium-ion battery., , , , and . ICPHM, page 1-6. IEEE, (2015)Adversarial Robustness Unhardening via Backdoor Attacks in Federated Learning., , , , and . CoRR, (2023)An Effective Hybrid Test Data Compression Method Using Scan Chain Compaction and Dictionary-Based Scheme., , , , and . ATS, page 151-156. IEEE Computer Society, (2008)