Author of the publication

Privacy-Preserving Compressed Reference-Oriented Alignment Map Using Decentralized Storage.

, , , , and . IEEE Access, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks Against Adversarial Examples., , , and . IEEE Access, (2022)EEJE: Two-Step Input Transformation for Robust DNN Against Adversarial Examples., , , and . IEEE Trans. Netw. Sci. Eng., 8 (2): 908-920 (2021)PIHA: Detection method using perceptual image hashing against query-based adversarial attacks., , and . Future Gener. Comput. Syst., (August 2023)Instance-Agnostic and Practical Clean Label Backdoor Attack Method for Deep Learning Based Face Recognition Models., , and . IEEE Access, (2023)Memory-Efficient Random Forest Generation Method for Network Intrusion Detection., , , and . ICUFN, page 305-307. IEEE, (2018)Robust Indoor Localization Methods Using Random Forest-Based Filter against MAC Spoofing Attack., , , and . Sensors, 20 (23): 6756 (2020)Visual Analytics System of Comprehensive Data Quality Improvement for Machine Learning using Data- and Process-driven Strategies., , , , , , and . IEEE Big Data, page 396-401. IEEE, (2022)Privacy-Preserving Compressed Reference-Oriented Alignment Map Using Decentralized Storage., , , , and . IEEE Access, (2018)CodeNet: Code-Targeted Convolutional Neural Network Architecture for Smart Contract Vulnerability Detection., , , and . IEEE Access, (2022)Clustering Approach for Detecting Multiple Types of Adversarial Examples., , , and . Sensors, 22 (10): 3826 (2022)