Author of the publication

DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications.

, , , , , , , , and . CCS, page 3197-3217. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment., , , , , , and . NDSS, The Internet Society, (2022)DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications., , , , , , , , and . CCS, page 3197-3217. ACM, (2021)Secure Public Audit for Operation Behavior Logs in Shared Cloud Storage., , , , , , and . CSE/EUC (2), page 51-57. IEEE Computer Society, (2017)Clues of Lithosphere, Atmosphere and Ionosphere Variations Possibly Related to the Preparation of La Palma 19 September 2021 Volcano Eruption., , , , , , , , , and 3 other author(s). Remote. Sens., 14 (19): 5001 (2022)BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems., , , , , , and . NDSS, The Internet Society, (2023)Analysis and Discussion of Configuration and Isolating Performance of Negative Stiffness Vibration Isolator., , and . ICKII, page 44-48. IEEE, (2021)Explanation Chains Model Based on the Fine-Grained Data., , , , and . NLPCC (2), volume 11839 of Lecture Notes in Computer Science, page 684-698. Springer, (2019)Adjacency-Hash-Table Based Public Auditing for Data Integrity in Mobile Cloud Computing., , , , and . Wirel. Commun. Mob. Comput., (2018)ADSIM: Network Anomaly Detection via Similarity-aware Heterogeneous Ensemble Learning., , , , , , , and . IM, page 608-612. IEEE, (2021)LAGNet: Lightweight Attention Guided Network for Real-time Semantic Segmentation., , , , and . ACAI, page 280-288. ACM, (2023)