Author of the publication

Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks.

, , , , , and . USENIX Security Symposium, page 2117-2134. USENIX Association, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OREL: an ontology-based rights expression language., , and . WWW (Alternate Track Papers & Posters), page 324-325. ACM, (2004)Parallel Mining of OWL 2 EL Ontology from Linked Data., and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 360-371. Springer, (2014)Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models., , , , , and . CoRR, (2020)Color Space Transformation and Multi-Class Weighted Loss for Adhesive White Blood Cell Segmentation., , , , , and . IEEE Access, (2020)Blackmailer or Consumer? A Character-level CNN Approach for Identifying Malicious Complaint Behaviors., , , , , and . ICNC, page 41-45. IEEE, (2020)QEM-based simplification of building footprints from Airborne LiDAR data., , and . IGARSS, page 1186-1189. IEEE, (2010)Geohazards observations and natural disaster assessment in China., , , , , and . IGARSS, page 950-953. IEEE, (2012)Geodesics-based topographical feature extraction from airborne Lidar data for disaster management., , and . Geoinformatics, page 1-5. IEEE, (2010)Incorporating the Plant Phenological Trajectory into Mangrove Species Mapping with Dense Time Series Sentinel-2 Imagery and the Google Earth Engine Platform., , , , and . Remote Sensing, 11 (21): 2479 (2019)PKUTM participation at TAC 2011 Summarization Track., , , , and . TAC, NIST, (2011)