Author of the publication

Backdoor Scanning for Deep Neural Networks through K-Arm Optimization.

, , , , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 9525-9536. PMLR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Mining-Based Analysis of Chinese Medicinal Herb Formulae in Metabolic associated fatty liver Disease Treatment., , , , , , and . ISAIMS, page 254-258. ACM, (2022)A Le Cam Type Bound for Adversarial Learning and Applications., , and . ISIT, page 1164-1169. IEEE, (2021)Towards Feature Space Adversarial Attack., , , , and . CoRR, (2020)MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity., , , , , , , and . NDSS, The Internet Society, (2022)ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes., , , , , , , , , and 1 other author(s). SP, page 899-916. IEEE, (2023)The Potential Mechanisms of Acupuncture in Cardiac Arrhythmias by Bioinformatics., , , , and . ISAIMS, page 84-89. ACM, (2023)Exploring the mechanism of action of acupuncture in the treatment of sciatica based on bioinformatics., , , , and . ISAIMS, page 1152-1156. ACM, (2023)Analysis of curative effect and point selection of different acupuncture treatments for sciatica based on data mining technology., , , , , and . ISAIMS, page 279-285. ACM, (2022)Differences In Acupuncture Treatment Of Dysmenorrhea Between China And Europe., , and . BIBE, page 39:1-39:4. ACM, (2021)Bounded Adversarial Attack on Deep Content Features., , and . CVPR, page 15182-15191. IEEE, (2022)