Author of the publication

Fawkes: Protecting Privacy against Unauthorized Deep Learning Models.

, , , , , and . USENIX Security Symposium, page 1589-1604. USENIX Association, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of Robust and Standardized Cantilever Sensors Based on Biotin/Neutravidin Coupling for Antibody Detection., , , , , and . Sensors, 13 (4): 5273-5285 (2013)Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks., , , , , and . USENIX Security Symposium, page 2117-2134. USENIX Association, (2022)Unleashing the Power of Shared Label Structures for Human Activity Recognition., , , , , and . CIKM, page 3340-3350. ACM, (2023)Understanding the Working Time of Developers in IT Companies in China and the United States., , , , , , and . IEEE Softw., 38 (2): 96-106 (2021)Task Offloading for Post-disaster Rescue in Vehicular Fog Computing-assisted UAV Networks., , , , and . MSN, page 105-112. IEEE, (2022)Understanding the User Interactions on GitHub: A Social Network Perspective., , , , and . CSCWD, page 1148-1153. IEEE, (2021)A System-Level Solution for Low-Power Object Detection., , , , , , , , , and 1 other author(s). ICCV Workshops, page 2461-2468. IEEE, (2019)How Few Davids Improve One Goliath: Federated Learning in Resource-Skewed Edge Computing Environments., , , , , , , and . WWW, page 2976-2985. ACM, (2024)Minimally Supervised Contextual Inference from Human Mobility: An Iterative Collaborative Distillation Framework., , , , and . IJCAI, page 2450-2458. ijcai.org, (2023)Physics-Informed Data Denoising for Real-Life Sensing Systems., , , , , , , , , and 2 other author(s). SenSys, page 83-96. ACM, (2023)