Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks., and . GLOBECOM, page 1-5. IEEE, (2011)A Distributed PCM Clustering Algorithm Based on Spark., , , and . ICMLC, page 70-74. ACM, (2019)Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection., , , and . CoRR, (2019)Understanding Impacts of Task Similarity on Backdoor Attack and Detection., , , , and . CoRR, (2022)Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection., , , , , and . USENIX Security Symposium, USENIX Association, (2024)Understanding the Brains and Brawn of Illicit Streaming App., , , , , , and . ICDF2C, volume 441 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 194-214. Springer, (2021)Order-Disorder: Imitation Adversarial Attacks for Black-box Neural Ranking Models., , , , , , , and . CCS, page 2025-2039. ACM, (2022)A multi-dimensional spam filtering framework based on threat intelligence., and . ISCID (1), page 158-162. IEEE, (2019)A hybrid gene selection method based on gene scoring strategy and improved particle swarm optimization., , , , , and . BMC Bioinform., 20-S (8): 289:1-289:13 (2019)Information cascades prediction with attention neural network., , , , and . HCIS, (2020)