Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Backdoor attacks and defenses in federated learning: Survey, challenges and future research directions., , , , , and . Eng. Appl. Artif. Intell., 127 (Part A): 107166 (January 2024)Backdoor Attack with Imperceptible Input and Latent Modification., , and . NeurIPS, page 18944-18957. (2021)An Attentive Spatio-Temporal Neural Model for Successive Point of Interest Recommendation., , and . PAKDD (3), volume 11441 of Lecture Notes in Computer Science, page 346-358. Springer, (2019)Asymmetric Hashing for Fast Ranking via Neural Network Measures., , , and . CoRR, (2022)Targeted display advertising: the case of preferential attachment., , , and . IEEE BigData, page 1868-1877. IEEE, (2019)Interpretable Graph Similarity Computation via Differentiable Optimal Alignment of Node Embeddings., , , and . SIGIR, page 665-674. ACM, (2021)Unified Energy-Based Generative Network for Supervised Image Hashing., , and . ACCV (6), volume 13846 of Lecture Notes in Computer Science, page 527-543. Springer, (2022)A Cosine Similarity-based Method for Out-of-Distribution Detection., , , , , and . CoRR, (2023)Defending Backdoor Attacks on Vision Transformer via Patch Processing., , , and . CoRR, (2022)Image Hashing by Minimizing Independent Relaxed Wasserstein Distance., , , and . CoRR, (2020)