Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Blockchain-Based Mutual Authentication Protocol for Smart Home., , , , and . ISC, volume 13640 of Lecture Notes in Computer Science, page 250-265. Springer, (2022)Stealing Deep Reinforcement Learning Models for Fun and Profit., , , , and . AsiaCCS, page 307-319. ACM, (2021)Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption., , , , and . CoRR, (2022)DPG-Net: Densely progressive-growing network for point cloud completion., , , , and . Neurocomputing, (2022)Towards Query-Efficient Black-Box Attacks: A Universal Dual Transferability-Based Framework., , , , , and . ACM Trans. Intell. Syst. Technol., 14 (4): 58:1-58:25 (August 2023)DeepSweep: An Evaluation Framework for Mitigating DNN Backdoor Attacks using Data Augmentation., , , , , and . CoRR, (2020)TransTroj: Transferable Backdoor Attacks to Pre-trained Models via Embedding Indistinguishability., , , , , and . CoRR, (2024)BadPre: Task-agnostic Backdoor Attacks to Pre-trained NLP Foundation Models., , , , , , and . ICLR, OpenReview.net, (2022)Triggerless Backdoor Attack for NLP Tasks with Clean Labels., , , , , , , , and . NAACL-HLT, page 2942-2952. Association for Computational Linguistics, (2022)Contrastive Fusion Representation: Mitigating Adversarial Attacks on VQA Models., , , , , , and . ICME, page 354-359. IEEE, (2023)