Author of the publication

Efficient Adversarial Training with Membership Inference Resistance.

, , , and . PRCV (1), volume 14425 of Lecture Notes in Computer Science, page 474-486. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification., , , and . KSII Trans. Internet Inf. Syst., 16 (8): 2507-2528 (2022)Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost., , , , and . IEEE Trans. Inf. Forensics Secur., (2021)HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors., , , , and . ICICS (1), volume 12918 of Lecture Notes in Computer Science, page 136-152. Springer, (2021)Model-agnostic adversarial example detection via high-frequency amplification., , , , , , and . Comput. Secur., (2024)A Survey of Security Network Coding toward Various Attacks., , , , and . TrustCom, page 252-259. IEEE Computer Society, (2014)Charge-Depleting of the Batteries Makes Smartphones Recognizable., , , and . ICPADS, page 33-40. IEEE Computer Society, (2017)Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs., , , , , and . NSS, volume 7873 of Lecture Notes in Computer Science, page 590-598. Springer, (2013)Biometrics-Authenticated Key Exchange for Secure Messaging., , , , , and . CCS, page 2618-2631. ACM, (2021)PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)., , , , , , and . ICSE, page 64:1-64:12. ACM, (2024)MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)