Author of the publication

A Lightweight Transformation Method for Privacy Protection in Image Classification.

, , , , , and . WASA (3), volume 15688 of Lecture Notes in Computer Science, page 96-106. Springer, (2025)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Learning-based Encrypted Malware Traffic Classification with AutoML., , , , , and . ICCT, page 313-322. IEEE, (2021)Threat identification model for suspected Internet of Things attack groups., , , and . ICSS, page 283-288. IEEE, (2022)CMIRGen: Automatic Signature Generation Algorithm for Malicious Network Traffic., , , , , and . TrustCom, page 736-743. IEEE, (2020)Adversarial Example Based Fingerprinting for Robust Copyright Protection in Split Learning., , , , , , , and . CoRR, (March 2025)A Lightweight Transformation Method for Privacy Protection in Image Classification., , , , , and . WASA (3), volume 15688 of Lecture Notes in Computer Science, page 96-106. Springer, (2025)A General Distributed Object Locating Architecture in the Internet of Things., , , and . ICPADS, page 730-735. IEEE Computer Society, (2010)Security Challenges in the Container Cloud., , , , and . TPS-ISA, page 137-145. IEEE, (2021)Masked Transformer-based Multi-GAN for 5G Core Network KPI Anomaly Detection., , , , , , , and . CSCWD, page 2601-2606. IEEE, (2024)Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model., , and . Comput. Secur., (February 2024)Internet of Things Attack Group Identification Model Combined with Spectral Clustering., , and . ICCT, page 778-782. IEEE, (2021)