Author of the publication

TAG: Gradient Attack on Transformer-based Language Models.

, , , , , , , and . EMNLP (Findings), page 3600-3610. Association for Computational Linguistics, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Against Membership Inference Attack: Pruning is All You Need., , , , , , , and . IJCAI, page 3141-3147. ijcai.org, (2021)A local approach of adaptive affinity propagation clustering for large scale data., , , and . IJCNN, page 2998-3002. IEEE Computer Society, (2009)A Fast and Effective Memristor-Based Method for Finding Approximate Eigenvalues and Eigenvectors of Non-negative Matrices., , , , and . ISVLSI, page 563-568. IEEE Computer Society, (2018)Privacy-preserving biomedical data dissemination via a hybrid approach., , and . AMIA, AMIA, (2018)An Improved Delay-dependent Stability Criteria for Recurrent Neural Networks with Time-varying Delay., , and . ISIC, page 876-881. IEEE, (2008)RRNet: Towards ReLU-Reduced Neural Network for Two-party Computation Based Private Inference., , , , , , , , , and 4 other author(s). CoRR, (2023)China's 12-Year Quest of Autonomous Vehicular Intelligence: The Intelligent Vehicles Future Challenge Program., , , , , , , , , and 1 other author(s). IEEE Intell. Transp. Syst. Mag., 13 (2): 6-19 (2021)Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers., , , , and . SIGMOD Conference, page 603-619. ACM, (2020)AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive Quantization., , , , , , , , and . MICRO, page 628-640. ACM, (2023)Deterministic Learning and Pattern-Based NN Control., , and . ISIC, page 144-149. IEEE, (2007)