Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Implementing Support for Pointers to Private Data in a General-Purpose Secure Multi-Party Compiler., , and . CoRR, (2015)Enforcing Input Correctness via Certification in Garbled Circuit Evaluation., , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 552-569. Springer, (2017)Design of Automatic Mapping System between DDC and CLC., , , and . ICADL, volume 7008 of Lecture Notes in Computer Science, page 357-366. Springer, (2011)A 16Gb/s Triple-Mode Driver in 0.18μm CMOS Technology., , , , , and . ICTA, page 96-97. IEEE, (2020)Research on Interaction Modeling of Cross-border E-commerce and Import and Export Trade., , , and . ICSEB, page 15-19. ACM, (2018)Distributed adversarial training to robustify deep neural networks at scale., , , , , , , , , and . UAI, volume 180 of Proceedings of Machine Learning Research, page 2353-2363. PMLR, (2022)Secure Computation on Floating Point Numbers., , , and . NDSS, The Internet Society, (2013)Understanding and Improving Visual Prompting: A Label-Mapping Perspective., , , , and . CVPR, page 19133-19143. IEEE, (2023)A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion., , and . CVPR Workshops, page 2385-2392. IEEE, (2023)Secure and Verifiable Outsourcing of Large-Scale Biometric Computations., , and . SocialCom/PASSAT, page 1185-1191. IEEE Computer Society, (2011)