Author of the publication

Red Alarm for Pre-trained Models: Universal Vulnerability to Neuron-level Backdoor Attacks.

, , , , , , , , and . Mach. Intell. Res., 20 (2): 180-193 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scheme for implementing multitarget qubit controlled-NOT gate of photons and controlled-phase gate of electron spins via quantum dot-microcavity coupled system., , , , , and . Quantum Inf. Process., 15 (4): 1485-1498 (2016)Continuity of the eigenvalues for a vibrating beam., , , and . Appl. Math. Lett., (2017)Symbol Error Rate Analysis of 8-state Stokes Vector Modulation for Large Capacity Data Centers., , and . WOCC, page 1-6. IEEE, (2020)Cryptanalysis of Two New Instances of TTM Cryptosystem., , , and . IACR Cryptology ePrint Archive, (2007)Attention-Based Multilevel Co-Occurrence Graph Convolutional LSTM for 3-D Action Recognition., , , , , , and . IEEE Internet Things J., 8 (21): 15990-16001 (2021)An Efficient Highly Adaptive and Deadlock-Free Routing Algorithm for 3D Network-on-Chip., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (7): 1334-1344 (2016)Emotion-Aware Cognitive System in Multi-Channel Cognitive Radio Ad Hoc Networks., , , , , , , and . IEEE Commun. Mag., 56 (4): 180-187 (2018)Resolving Power Equipment Data Inconsistency via Heterogeneous Network Alignment., , , , and . IEEE Access, (2023)Edge-Cloud Computing and Artificial Intelligence in Internet of Medical Things: Architecture, Technology and Application., , , and . IEEE Access, (2020)Development of a Wire Harness Assembly Motion Planner for Redundant Multiple Manipulators., , , and . J. Robotics Mechatronics, 23 (6): 907-918 (2011)