Author of the publication

Textual adversarial attacks by exchanging text-self words.

, , , , , , , , and . Int. J. Intell. Syst., 37 (12): 12212-12234 (December 2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Orthogonal Design-Based NSGA-III for the Optimal Lockage Co-Scheduling Problem., , and . IEEE Trans. Intell. Transp. Syst., 18 (8): 2085-2095 (2017)Modified NSGA-II for Solving Continuous Berth Allocation Problem: Using Multiobjective Constraint-Handling Strategy., , and . IEEE Trans. Cybern., 47 (9): 2885-2895 (2017)A novel multi-parameter similarity measure of interval neutrosophic sets for medical diagnosis., , , and . J. Intell. Fuzzy Syst., 45 (6): 11333-11351 (December 2023)A BiLSTM-CRF Method to Chinese Electronic Medical Record Named Entity Recognition., , , , , , and . ACAI, page 48:1-48:6. ACM, (2018)Style2Talker: High-Resolution Talking Head Generation with Emotion Style and Art Style., , and . AAAI, page 5079-5087. AAAI Press, (2024)Chain-of-Thought Improves Text Generation with Citations in Large Language Models., , , and . AAAI, page 18345-18353. AAAI Press, (2024)A Network Intrusion Detection Method Based on CNN and CBAM., , , and . INFOCOM Workshops, page 1-6. IEEE, (2021)An exact approach to the generalized serial-lock scheduling problem from a flexible job-shop scheduling perspective., , , and . Comput. Oper. Res., (2021)A branch-and-price-based heuristic for the vehicle routing problem with two-dimensional loading constraints and time windows., , , and . Int. Trans. Oper. Res., 31 (2): 658-691 (March 2024)Early Screening of Autism in Toddlers via Response-To-Instructions Protocol., , , , , , , , , and . IEEE Trans. Cybern., 52 (5): 3914-3924 (2022)