Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and verifiable outsourcing of large-scale biometric computations., , and . ACM Trans. Inf. Syst. Secur., 16 (3): 11 (2013)Efficient Dynamic Provable Possession of Remote Data via Update Trees., and . IACR Cryptology ePrint Archive, (2012)Understanding and Improving Visual Prompting: A Label-Mapping Perspective., , , , and . CoRR, (2022)Secure distributed genome analysis for GWAS and sequence comparison computation., , and . BMC Medical Informatics Decis. Mak., 15-S (5): S4 (December 2015)Distributed adversarial training to robustify deep neural networks at scale., , , , , , , , , and . UAI, volume 180 of Proceedings of Machine Learning Research, page 2353-2363. PMLR, (2022)What Is Missing in IRM Training and Evaluation? Challenges and Solutions., , , , , and . ICLR, OpenReview.net, (2023)A Pilot Study of Query-Free Adversarial Attack against Stable Diffusion., , and . CVPR Workshops, page 2385-2392. IEEE, (2023)Linearly Constrained Bilevel Optimization: A Smoothed Implicit Gradient Approach., , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 16291-16325. PMLR, (2023)Understanding and Improving Visual Prompting: A Label-Mapping Perspective., , , , and . CVPR, page 19133-19143. IEEE, (2023)Secure and Verifiable Outsourcing of Large-Scale Biometric Computations., , and . SocialCom/PASSAT, page 1185-1191. IEEE Computer Society, (2011)