Author of the publication

Style-Based Point Generator With Adversarial Rendering for Point Cloud Completion.

, , , , , and . CVPR, page 4619-4628. Computer Vision Foundation / IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FedSelect: Personalized Federated Learning with Customized Selection of Parameters for Fine-Tuning., , , , , and . CoRR, (2024)Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?, , , , , , , , and . CoRR, (2023)Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions., , , , , and . CoRR, (2022)Differentially Private Synthetic Data via Foundation Model APIs 2: Text., , , , , , , , , and 2 other author(s). CoRR, (2024)Unraveling the Connections between Privacy and Certified Robustness in Federated Learning Against Poisoning Attacks., , , , , and . CCS, page 1511-1525. ACM, (2023)CoPur: Certifiably Robust Collaborative Inference via Feature Purification., , , and . NeurIPS, (2022)DBA: Distributed Backdoor Attacks against Federated Learning., , , and . ICLR, OpenReview.net, (2020)Data Quality Transaction on Different Distributed Ledger Technologies., , , , and . BigSDM, volume 11473 of Lecture Notes in Computer Science, page 301-318. Springer, (2018)GuardAgent: Safeguard LLM Agents by a Guard Agent via Knowledge-Enabled Reasoning., , , , , , , , , and 2 other author(s). CoRR, (2024)Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses., , , , , , , , and . CoRR, (2020)