Author of the publication

Label-Only Model Inversion Attacks: Attack With the Least Information.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficiently Constructing Adversarial Examples by Feature Watermarking., , , , , and . CoRR, (2020)Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt., , , , and . IEEE Access, (2018)A Robust Game-Theoretical Federated Learning Framework With Joint Differential Privacy., , , , and . IEEE Trans. Knowl. Data Eng., 35 (4): 3333-3346 (April 2023)Deep Metric Learning for K Nearest Neighbor Classification., , , , , and . IEEE Trans. Knowl. Data Eng., 35 (1): 264-275 (2023)the Connection between Cryptography and Differential Privacy: a Survey., , , and . CoRR, (2020)More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design., , , , and . ACM Comput. Surv., 54 (7): 136:1-136:37 (2022)Machine Unlearning: A Survey., , , , and . ACM Comput. Surv., 56 (1): 9:1-9:36 (January 2024)Privacy Intelligence: A Survey on Image Sharing on Online Social Networks., , , and . CoRR, (2020)Fair and Differentially Private Distributed Frequency Estimation., , , , and . CoRR, (2021)An iteration-based differentially private social network data release., , , , and . Comput. Syst. Sci. Eng., (2018)