Author of the publication

Lotto: Secure Participant Selection against Adversarial Servers in Federated Learning.

, , , , , and . USENIX Security Symposium, USENIX Association, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blind Panoramic Image Quality Assessment via the Asymmetric Mechanism of Human Brain., , and . VCIP, page 1-4. IEEE, (2019)Blind Panoramic Image Quality Assessment Based on Project-Weighted Local Binary Pattern., , and . IFTC, volume 1181 of Communications in Computer and Information Science, page 249-258. Springer, (2019)Job Cost and Constraint Relaxation for Scheduling Problem Solving in the CLP Paradigm., , , and . ECAI, page 640-644. John Wiley and Sons, Chichester, (1994)Towards Multi-Dimensional Separating of NFRs in Software Architecture., , , , , and . CSSE (2), page 104-107. IEEE Computer Society, (2008)978-0-7695-3336-0.Positioning Localities for Vague Spatial Location Description: A Supervaluation Semantics Approach., , , and . ISPRS Int. J. Geo Inf., 11 (1): 68 (2022)In-Database Regression in Input Sparsity Time., , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 4797-4806. PMLR, (2021)Design and implementation of intelligent security monitoring system based on RPA+AI., , , and . EITCE, page 1459-1466. ACM, (2023)RFD-ECNet: Extreme Underwater Image Compression with Reference to Feature Dictionary., , , , and . ICCV, page 12934-12943. IEEE, (2023)JNDMix: Jnd-Based Data Augmentation for No-Reference Image Quality Assessment., , , and . ICASSP, page 1-5. IEEE, (2023)Start from Zero: Triple Set Prediction for Automatic Knowledge Graph Completion., , , , , , , and . CoRR, (2024)