Author of the publication

Model Stealing Defense against Exploiting Information Leak through the Interpretation of Deep Neural Nets.

, , and . IJCAI, page 710-716. ijcai.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Compatibility Analysis of the Turbo Controller Area Network (TURBO CAN)., , , , , and . IEEE Trans. Vehicular Technology, 67 (6): 5146-5157 (2018)Decoy Signal Based Strategic Beamforming Against High-Power Reactive Jamming., , , , and . IEEE Trans. Vehicular Technology, 67 (10): 10054-10058 (2018)Analysis of D2D system performance with a maximal SINR channel selection strategy., , and . ICTC, page 379-380. IEEE, (2014)CNN-Based Adaptive Source Node Identifier for Controller Area Network (CAN)., , , , and . IEEE Trans. Veh. Technol., 69 (11): 13916-13920 (2020)A 110dB-CMRR 100dB-PSRR multi-channel neural-recording amplifier system using differentially regulated rejection ratio enhancement in 0.18μm CMOS., , , , , , , and . ISSCC, page 472-474. IEEE, (2018)Random access success probability in full-duplex radio networks., , and . ICUFN, page 99-101. IEEE, (2016)Secure Capacity Analysis for Magnetic Inductive Coupling-Based SWIPT System., , , and . IEEE Access, (2018)Nearly Non-Coupling Coil Array Allowing Many Independent Channels for Magnetic Communication., , , , and . IEEE Access, (2018)Heart Rate Variability as a Potential Indicator of Cancer Pain in a Mouse Model of Peritoneal Metastasis., , , , and . Sensors, 22 (6): 2152 (2022)Model Stealing Defense against Exploiting Information Leak through the Interpretation of Deep Neural Nets., , and . IJCAI, page 710-716. ijcai.org, (2022)