From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DPAdapter: Improving Differentially Private Deep Learning through Noise Tolerance Pre-training., , , , , , и . CoRR, (2024)Continuous Release of Data Streams under both Centralized and Local Differential Privacy., , , , , , , и . CoRR, (2020)FAKEPCD: Fake Point Cloud Detection via Source Attribution., , , , и . CoRR, (2023)REAP: An Efficient Incentive Mechanism for Reconciling Aggregation Accuracy and Individual Privacy in Crowdsensing., , , и . CoRR, (2017)ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models., , , , , , , , и . CoRR, (2021)Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning., , , и . CoRR, (2020)Comparative Study on the Effect of Shape Complexity on the Efficiency of Different Overlay Analysis Algorithms., , , , , и . IEEE Access, (2021)AHEAD: Adaptive Hierarchical Decomposition for Range Query under Local Differential Privacy., , , , , , и . CCS, стр. 1266-1288. ACM, (2021)CampER: An Effective Framework for Privacy-Aware Deep Entity Resolution., , , , , , , и . KDD, стр. 626-637. ACM, (2023)Cardinality constraint analyse and implementation in access control model., , и . NCM, стр. 265-267. IEEE Computer Society, (2010)