Author of the publication

Labels Are Culprits: Defending Gradient Attack on Privacy.

, , , , and . IEEE Internet Things J., 11 (4): 6007-6019 (February 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Local Information Improves Rendezvous in Cognitive Radio Networks., , , , , , , and . SECON, page 352-360. IEEE, (2018)Efficient Rendezvous for Heterogeneous Interference in Cognitive Radio Networks., , , and . IEEE Trans. Wirel. Commun., 19 (1): 91-105 (2020)Adversarial Attacks on ASR Systems: An Overview., , , , , and . CoRR, (2022)A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT., , , and . Remote. Sens., 14 (24): 6371 (December 2022)A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX., and . Wirel. Commun. Mob. Comput., (2021)Adversarial perturbation denoising utilizing common characteristics in deep feature space., , , , , , and . Appl. Intell., 54 (2): 1672-1690 (2024)MF2POSE: Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss., , , , , , and . Knowl. Based Syst., (January 2024)Visually imperceptible adversarial patch attacks., , , , , , and . Comput. Secur., (2022)STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means., , , , , , and . Simul. Model. Pract. Theory, (2022)Nearly optimal asynchronous blind rendezvous algorithm for Cognitive Radio Networks., , , and . SECON, page 371-379. IEEE, (2013)