Author of the publication

Understanding the Robustness of Randomized Feature Defense Against Query-Based Adversarial Attacks.

, , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emerging Privacy and Trust Issues for Autonomous Vehicle Systems., , , and . ICOIN, page 52-57. IEEE, (2022)Towards a respondent-preferred k i -anonymity model., and . Frontiers Inf. Technol. Electron. Eng., 16 (9): 720-731 (2015)Secure rank correlation computation for IoT applications., and . Int. J. Serv. Technol. Manag., 23 (1/2): 40-51 (2017)Privacy-preserving frequent itemsets mining via secure collaborative framework., and . Secur. Commun. Networks, 5 (3): 263-272 (2012)Evaluation of black-marker and bilateral classification with J48 decision tree in anomaly based intrusion detection system., , , , and . J. Intell. Fuzzy Syst., 35 (6): 5927-5937 (2018)Privacy Preserving of IP Address through Truncation Method in Network-based Intrusion Detection System., , , and . ICSCA, page 569-573. ACM, (2019)Efficient Two-Party Integer Comparison With Block Vectorization Mechanism., , and . IEEE Access, (2021)Privacy-preserving similarity coefficients for binary data., and . Comput. Math. Appl., 65 (9): 1280-1290 (2013)Fooling the Textual Fooler via Randomizing Latent Representations., , , , , and . CoRR, (2023)Synthesizing Physical Backdoor Datasets: An Automated Framework Leveraging Deep Generative Models., , , , , , , and . CoRR, (2023)