Author of the publication

MetaV: A Meta-Verifier Approach to Task-Agnostic Model Fingerprinting.

, , , and . KDD, page 1327-1336. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On hexavalent half-arc-transitive bi-dihedrants.. Discret. Math., 347 (12): 114180 (2024)On g-extra connectivity of folded hypercubes., and . Theor. Comput. Sci., (2015)Seismic Noise Attenuation Using Unsupervised Sparse Feature Learning., , , and . IEEE Trans. Geosci. Remote. Sens., 57 (12): 9709-9723 (2019)Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering., , and . KSII Trans. Internet Inf. Syst., 10 (10): 4933-4956 (2016)Attention-Guided Multi-Scale Segmentation Neural Network for Interactive Extraction of Region Objects from High-Resolution Satellite Imagery., , , , and . Remote. Sens., 12 (5): 789 (2020)FedAIoT: A Federated Learning Benchmark for Artificial Intelligence of Things., , , , , , , , , and 1 other author(s). CoRR, (2023)Modeling Personalized Out-of-Town Distances in Location Recommendation., , , , and . ICDM, page 112-121. IEEE, (2020)NELoRa: Towards Ultra-low SNR LoRa Communication with Neural-enhanced Demodulation., , , , , , , , , and . SenSys, page 56-68. ACM, (2021)NestDNN: Resource-Aware Multi-Tenant On-Device Deep Learning for Continuous Mobile Vision., , and . MobiCom, page 115-127. ACM, (2018)Rethinking White-Box Watermarks on Deep Learning Models under Neural Structural Obfuscation., , , and . USENIX Security Symposium, page 2347-2364. USENIX Association, (2023)