Author of the publication

Similarity-Based Label Inference Attack Against Training and Inference of Split Learning.

, , , and . IEEE Trans. Inf. Forensics Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Secrecy Outage Probability for the $i$th Closest Legitimate User in Stochastic Networks., , , and . IEEE Communications Letters, 18 (7): 1230-1233 (2014)A Stochastic Optimization Framework for Adaptive Spectrum Access and Power Allocation in Licensed-Assisted Access Networks., , and . IEEE Access, (2017)Optimal Energy-Efficient Relay Deployment for the Bidirectional Relay Transmission Schemes., , , , and . IEEE Trans. Vehicular Technology, 63 (6): 2625-2641 (2014)Design and Analysis of Downlink Channel Estimation Based on Parametric Model for Massive MIMO in FDD Systems., , , and . CoRR, (2016)Preserving Reliability to Heterogeneous Ultra-Dense Distributed Networks in Unlicensed Spectrum., , , , , , and . CoRR, (2017)Blockchain Based Secure Package Delivery via Ridesharing., , , , , and . WCSP, page 1-6. IEEE, (2019)Blockchain-Empowered Content Cache System for Vehicle Edge Computing Networks., , , , and . BlockSys, volume 1156 of Communications in Computer and Information Science, page 410-421. Springer, (2019)Online Anticipatory Proactive Network Association in Mobile Edge Computing for IoT., , , , , and . IEEE Trans. Wirel. Commun., 19 (7): 4519-4534 (2020)The Joint and Product Meta Distributions of the SIR and Their Applications to Secrecy and Cooperation., , , and . IEEE Trans. Wirel. Commun., 19 (7): 4408-4423 (2020)An Actor-Critic Deep Reinforcement Learning Based Computation Offloading for Three-Tier Mobile Computing Networks., , , , and . WCSP, page 1-6. IEEE, (2019)