Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fault Localization for Null Pointer Exception Based on Stack Trace and Program Slicing., , , , , and . QSIC, page 9-12. IEEE, (2012)Recognizing the HRRP by Combining CNN and BiRNN With Attention Mechanism., , , , , and . IEEE Access, (2020)Impact of agricultural industrial structure adjustment on energy conservation and income growth in Western China: a statistical study., , and . Ann. Oper. Res., 228 (1): 23-33 (2015)An approach for test data generation using program slicing and particle swarm optimization., , , , and . Neural Comput. Appl., 25 (7-8): 2047-2055 (2014)Backdoor Vulnerabilities in Normally Trained Deep Learning Models., , , , , , , , , and . CoRR, (2022)BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2023)Towards More Suitable Personalization in Federated Learning via Decentralized Partial Model Training., , , , , , and . CoRR, (2023)Better Trigger Inversion Optimization in Backdoor Scanning., , , , , , , and . CVPR, page 13358-13368. IEEE, (2022)FLIP: A Provable Defense Framework for Backdoor Mitigation in Federated Learning., , , , , , , , , and 1 other author(s). ICLR, OpenReview.net, (2023)TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks., , , , and . ICSE, page 986-998. ACM, (2020)