Personensuche
X
?
Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science ,
1
Efficient Black-Box Adversarial Attacks with Training Surro..:
, In:
?
Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science ,
3
An Android Malware Detection Method Based on Metapath Aggre..:
, In:
?
Communications in Computer and Information Science; Ubiquitous Security ,
7
A Probability Mapping-Based Privacy Preservation Method for..:
, In:
?
Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science ,
10
A Label Flipping Attack on Machine Learning Model and Its D..:
, In:
?
2023 International Conference on Networking and Network Applications (NaNA) ,
14
A Multivariate Time Series Anomaly Detection Model Based on..:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
15