Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending Against Free-Riders Attacks in Distributed Generative Adversarial Networks., , , and . FC, volume 13951 of Lecture Notes in Computer Science, page 200-217. Springer, (2023)Multi-Band Hyperspectral Object Tracking: Leveraging Spectral Information Prompts and Spectral Scale-Aware Representation., , , , , , , , , and . WHISPERS, page 1-5. IEEE, (2023)Miniature 3D Depth Camera for Real-time Reconstruction., , , , and . ROBIO, page 1769-1776. IEEE, (2019)TabuLa: Harnessing Language Models for Tabular Data Synthesis., , and . CoRR, (2023)Security analysis of Bloom filter based multicast forwarding., , , , , and . ACM TUR-C, page 38:1-38:10. ACM, (2017)Federated Learning for Tabular Data: Exploring Potential Risk to Privacy., , , and . ISSRE, page 193-204. IEEE, (2022)GDTS: GAN-Based Distributed Tabular Synthesizer., , and . CLOUD, page 570-576. IEEE, (2023)Feedback Control for Online Training of Neural Networks., , , and . CCTA, page 136-141. IEEE, (2019)Design and Analysis of a Synergy-Inspired Three-Fingered Hand., , , , and . ICRA, page 8942-8948. IEEE, (2020)GTV: Generating Tabular Data via Vertical Federated Learning., , , and . CoRR, (2023)