Author of the publication

Minimalism is King! High-Frequency Energy-Based Screening for Data-Efficient Backdoor Attacks.

, , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Context-Aware Caching with Social Behavior in MEC-Enabled Wireless Cellular Networks., , and . PerCom Workshops, page 1004-1008. IEEE, (2019)Mapping the soil types combining multi-temporal remote sensing data with texture features., , , , and . Comput. Electron. Agric., (2022)Equipping the Barzilai-Borwein Method with the Two Dimensional Quadratic Termination Property., , and . SIAM J. Optim., 31 (4): 3068-3096 (2021)Distributed stochastic gradient tracking methods with momentum acceleration for non-convex optimization., , , , and . Comput. Optim. Appl., 84 (2): 531-572 (March 2023)Mobility-Aware Coded Probabilistic Caching Scheme for MEC-Enabled Small Cell Networks., , , and . IEEE Access, (2017)A spectral and radial basis function hybrid method for visualizing vascular flows., , , , and . CompIMAGE, page 205-208. CRC Press, (2012)A Practical Range Encoding Scheme for TCAMs., , , , and . SIGCOMM Posters and Demos, page 163-165. ACM, (2019)The Prototype of Decentralized Multilateral Co-Governing Post-IP Internet Architecture and Its Testing on Operator Networks., , , , , , , , , and 25 other author(s). CoRR, (2019)Stochastic Variance Reduced Gradient Methods Using a Trust-Region-Like Scheme., , , and . J. Sci. Comput., 87 (1): 5 (2021)A Robust Algorithm for Optimization with General Equality and Inequality Constraints., and . SIAM J. Sci. Comput., 22 (2): 517-534 (2000)