Author of the publication

DPCL: Contrastive representation learning with differential privacy.

, , , , , , and . Int. J. Intell. Syst., 37 (11): 9701-9725 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defenses to Membership Inference Attacks: A Survey., , , , , , , and . ACM Comput. Surv., 56 (4): 92:1-92:34 (April 2024)Towards Differentially Private Contrastive Learning., , , , , and . ML4CS (2), volume 13656 of Lecture Notes in Computer Science, page 510-520. Springer, (2022)Querying little is enough: Model inversion attack via latent information., , , and . Int. J. Intell. Syst., 36 (2): 681-690 (2021)DPCL: Contrastive representation learning with differential privacy., , , , , , and . Int. J. Intell. Syst., 37 (11): 9701-9725 (2022)Explanation-based data-free model extraction attacks., , , and . World Wide Web (WWW), 26 (5): 3081-3092 (September 2023)Kernel-based adversarial attacks and defenses on support vector classification., , , and . Digit. Commun. Networks, 8 (4): 492-497 (2022)Effective detection of mobile malware behavior based on explainable deep neural network., , , , , , , and . Neurocomputing, (2021)Holistic Implicit Factor Evaluation of Model Extraction Attacks., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (6): 4678-4689 (November 2023)Detect Adversarial Examples by Using Feature Autoencoder., , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 233-242. Springer, (2022)Explanation-Guided Minimum Adversarial Attack., , , , and . ML4CS (1), volume 13655 of Lecture Notes in Computer Science, page 257-270. Springer, (2022)