Author of the publication

StolenEncoder: Stealing Pre-trained Encoders in Self-supervised Learning.

, , , and . CCS, page 2115-2128. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification., and . ACSAC, page 278-287. ACM, (2017)Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN), , , , , , , and . CoRR, (2011)IPGuard: Protecting the Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary., , and . CoRR, (2019)Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes., , and . CoRR, (2020)Attacking Graph-based Classification via Manipulating the Graph Structure., and . ACM Conference on Computer and Communications Security, page 2023-2040. ACM, (2019)EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis., , , and . ACM Conference on Computer and Communications Security, page 1338-1350. ACM, (2018)Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data., , , and . USENIX Security Symposium, page 519-536. USENIX Association, (2022)Deep Neural Network Piration without Accuracy Loss., , , , , and . ICMLA, page 1032-1038. IEEE, (2022)Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing., , , and . WWW, page 2718-2724. ACM / IW3C2, (2020)Linear-Time Self Attention with Codeword Histogram for Efficient Recommendation., , , , , , and . WWW, page 1262-1273. ACM / IW3C2, (2021)