Author of the publication

CILIATE: Towards Fairer Class-Based Incremental Learning by Dataset and Training Refinement.

, , , , , and . ISSTA, page 475-487. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BadNL: Backdoor Attacks Against NLP Models., , , , and . CoRR, (2020)ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation., , , , , and . CCS, page 1265-1282. ACM, (2019)Deep Learning Backdoors., , , and . Security and Artificial Intelligence, (2022)The Case for Learned Provenance Graph Storage Systems., , , and . USENIX Security Symposium, page 3277-3294. USENIX Association, (2023)ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning., , , and . USENIX Security Symposium, page 3023-3040. USENIX Association, (2021)Complex Backdoor Detection by Symmetric Feature Differencing., , , , , and . CVPR, page 14983-14993. IEEE, (2022)Training with More Confidence: Mitigating Injected and Natural Backdoors During Training., , , and . NeurIPS, (2022)COLO: COarse-grained LOck-stepping virtual machines for non-stop service., , , , , , and . SoCC, page 3:1-3:16. ACM, (2013)An adaptive enhancement method based on stochastic parallel gradient descent of glioma image., , , , , and . IET Image Process., 17 (14): 3976-3985 (2023)EX-RAY: Distinguishing Injected Backdoor from Natural Features in Neural Networks by Examining Differential Feature Symmetry., , , , , and . CoRR, (2021)