Author of the publication

Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis.

, , , , , and . INFOCOM, page 1-10. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of PPG and ECG synchronous acquisition system based on NRF52832., , , , , , and . ICCE-Taiwan, page 249-250. IEEE, (2023)A Method for ECG R-wave Denoising and Detecting., , , , , and . ICCE-TW, page 557-558. IEEE, (2022)Towards a Believable Decoy System: Replaying Network Activities from Real System., , and . CNS, page 1-9. IEEE, (2020)GPU Accelerated Image Matching with Cascade Hashing., , and . CCCV (1), volume 771 of Communications in Computer and Information Science, page 91-101. Springer, (2017)Verification of data redundancy in cloud storage., , , and . SCC@ASIACCS, page 11-18. ACM, (2013)Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments., , , , , and . ACM Conference on Computer and Communications Security, page 1001-1015. ACM, (2020)MTD 2014: First ACM Workshop on Moving Target Defense., and . ACM Conference on Computer and Communications Security, page 1550-1551. ACM, (2014)A Self-shielding Dynamic Network Architecture., , , , and . MILCOM, page 1381-1386. IEEE, (2011)Securing network access in wireless sensor networks., , , , and . WISEC, page 261-268. ACM, (2009)GPU Accelerated Cascade Hashing Image Matching for Large Scale 3D Reconstruction., , and . CoRR, (2018)