Author of the publication

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.

, , , , , , , and . ICCV, page 4986-4996. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Protection for Medical Data Sharing in Smart Healthcare., , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (3s): 100:1-100:18 (2020)Data protection based on multifunction digital watermark in wireless sensor network., , , and . ICCST, page 37-41. IEEE, (2015)Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic., , , , , , and . WWW, page 1991-1999. ACM, (2023)Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds., , , , , and . ACM TUR-C, page 164-165. ACM, (2023)MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage., , , , , , , , , and . PST, page 1-11. IEEE, (2023)Challenges and Solutions in Vectored DSL., , , , and . AccessNets, volume 37 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 192-203. Springer, (2009)DSM from Theory to Practice., , , , , and . GLOBECOM, page 5693-5696. IEEE, (2008)Hawkes-Enhanced Spatial-Temporal Hypergraph Contrastive Learning Based on Criminal Correlations., , , , , , , , and . AAAI, page 8733-8741. AAAI Press, (2024)FLForest: Byzantine-robust Federated Learning through Isolated Forest., , and . ICPADS, page 296-303. IEEE, (2022)Oriented Group Provable Data Possession in Public Cloud., , , and . IIH-MSP, page 775-778. IEEE, (2014)