From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Corrupting Convolution-based Unlearnable Datasets with Pixel-based Image Transformations., , , , , , и . CoRR, (2023)Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data., , , , и . IEEE Trans. Image Processing, 25 (7): 3411-3425 (2016)Detecting Backdoors During the Inference Stage Based on Corruption Robustness Consistency., , , , , , , и . CVPR, стр. 16363-16372. IEEE, (2023)Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data., , , , , и . INFOCOM, стр. 1-9. IEEE, (2016)Detector Collapse: Backdooring Object Detection to Catastrophic Overload or Blindness., , , , , , , и . CoRR, (2024)Denial-of-Service or Fine-Grained Control: Towards Flexible Model Poisoning Attacks on Federated Learning., , , , , , и . IJCAI, стр. 4567-4575. ijcai.org, (2023)Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability., , , , , , , и . SP, стр. 3365-3384. IEEE, (2024)Robust Backdoor Detection for Deep Learning via Topological Evolution Dynamics., , , , , , , и . SP, стр. 2048-2066. IEEE, (2024)Self-Supervised Adversarial Example Detection by Disentangled Representation., , , , , и . CoRR, (2021)Feature-Indistinguishable Attack to Circumvent Trapdoor-Enabled Defense., , , , и . CCS, стр. 3159-3176. ACM, (2021)