From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT., , , , и . Inf. Sci., (2020)WMDefense: Using Watermark to Defense Byzantine Attacks in Federated Learning., , и . INFOCOM Workshops, стр. 1-6. IEEE, (2022)Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud., , , , и . ICC, стр. 1-6. IEEE, (2020)Privacy-preserving public auditing for non-manager group., , и . ICC, стр. 1-6. IEEE, (2017)LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check., , , , , и . IEEE Trans. Inf. Forensics Secur., (2022)VFL: A Verifiable Federated Learning with Privacy-Preserving for Big Data in Industrial IoT., , , , и . CoRR, (2020)CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences., , , , , и . CoRR, (2022)Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses., , , , , , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (5): 3716-3733 (сентября 2023)MLMSA: Multilabel Multiside-Channel-Information Enabled Deep Learning Attacks on APUF Variants., , , , , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (9): 2863-2876 (сентября 2023)Quantization Backdoors to Deep Learning Commercial Frameworks., , , , , , , , , и . IEEE Trans. Dependable Secur. Comput., 21 (3): 1155-1172 (мая 2024)