Author of the publication

A Fusion-Denoising Attack on InstaHide with Data Augmentation.

, , , , and . AAAI, page 1899-1907. AAAI Press, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive updating protocol for reducing moving object database workload., , and . VLDB J., 21 (2): 265-286 (2012)Query Processing in OODB., , and . DASFAA, volume 2 of Advanced Database Research and Development Series, page 1-10. World Scientific, (1991)Parallelizing stateful operators in a distributed stream processing system: how, should you and how much?, , , and . DEBS, page 278-289. ACM, (2012)Spatial Joins by Precomputation of Approximations., , and . Australasian Database Conference, volume 17 of Australian Computer Science Communications, (1995)Crew: cross-modal resource searching by exploiting wikipedia., , , and . ACM Multimedia, page 1669-1672. ACM, (2010)B-trees: Bearing Fruits of All Kinds., and . Australasian Database Conference, volume 5 of CRPIT, Australian Computer Society, (2002)Compressing the Index - A Simple and yet Efficient Approximation Approach to High-Dimensional Indexing., , and . WAIM, volume 2118 of Lecture Notes in Computer Science, page 291-304. Springer, (2001)XStorM: A Scalable Storage Mapping Scheme for XML Data., , , and . WWW Posters, (2001)Indexing the Distance: An Efficient Method to KNN Processing., , , and . VLDB, page 421-430. Morgan Kaufmann, (2001)BATON: A Balanced Tree Structure for Peer-to-Peer Networks., , and . VLDB, page 661-672. ACM, (2005)