Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authenticated Data Sharing With Privacy Protection and Batch Verification for Healthcare IoT., , , , , and . IEEE Trans. Sustain. Comput., 8 (1): 32-42 (January 2023)Efficient Hash-Based Redactable Signature for Smart Grid Applications., , , , , and . ESORICS (3), volume 13556 of Lecture Notes in Computer Science, page 554-573. Springer, (2022)Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks., , , , , , and . CoRR, (2020)One-to-Multiple Clean-Label Image Camouflage (OmClic) based Backdoor Attack on Deep Learning., , , , , , , , and . CoRR, (2023)One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning., , , , , , , , and . Knowl. Based Syst., (2024)Quantization Backdoors to Deep Learning Commercial Frameworks., , , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (3): 1155-1172 (May 2024)Decamouflage: A Framework to Detect Image-Scaling Attacks on CNN., , , , , , and . DSN, page 63-74. IEEE, (2021)An Investigation into Misuse of Java Security APIs by Large Language Models., , , , and . AsiaCCS, ACM, (2024)OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning., , , , , and . IEEE Trans. Parallel Distributed Syst., 33 (12): 3460-3477 (2022)Profiler: Profile-Based Model to Detect Phishing Emails., , , , , and . CoRR, (2022)