Author of the publication

Zeroth-Order Gradient Approximation Based DaST for Black-Box Adversarial Attacks.

, , , , and . ICIC (1), volume 14086 of Lecture Notes in Computer Science, page 442-453. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Differentially Private Contrastive Learning., , , , , and . ML4CS (2), volume 13656 of Lecture Notes in Computer Science, page 510-520. Springer, (2022)Zeroth-Order Gradient Approximation Based DaST for Black-Box Adversarial Attacks., , , , and . ICIC (1), volume 14086 of Lecture Notes in Computer Science, page 442-453. Springer, (2023)GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification., , , , , , and . CoRR, (2023)Explanation-Guided Minimum Adversarial Attack., , , , and . ML4CS (1), volume 13655 of Lecture Notes in Computer Science, page 257-270. Springer, (2022)Explanation-based data-free model extraction attacks., , , and . World Wide Web (WWW), 26 (5): 3081-3092 (September 2023)Holistic Implicit Factor Evaluation of Model Extraction Attacks., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 4678-4689 (November 2023)Detect Adversarial Examples by Using Feature Autoencoder., , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 233-242. Springer, (2022)DPCL: Contrastive representation learning with differential privacy., , , , , , and . Int. J. Intell. Syst., 37 (11): 9701-9725 (2022)TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline., , , , , and . SPAC, page 14-19. IEEE, (2018)Are You Copying My Prompt? Protecting the Copyright of Vision Prompt for VPaaS via Watermark., , , , , and . CoRR, (2024)