Author of the publication

CNNs Under Attack: On the Vulnerability of Deep Neural Networks Based Face Recognition to Image Morphing.

, , , and . IWDW, volume 10431 of Lecture Notes in Computer Science, page 121-135. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new almost compactness in L-topological spaces., , and . FSKD, page 23-25. IEEE, (2011)Adaptive sleep mode management in IEEE 802.16m wireless metropolitan area networks., , , and . Comput. Networks, 55 (16): 3774-3783 (2011)Mapping Large-Scale Forest Disturbance Types with Multi-Temporal CNN Framework., , , , , and . Remote. Sens., 13 (24): 5177 (2021)Retracted: Multiscale fast correlation filtering tracking algorithm based on a feature fusion model., , , , , , and . Concurr. Comput. Pract. Exp., (2022)Privacy-Aware High-Quality Map Generation with Participatory Sensing., , , , , and . IEEE Trans. Mob. Comput., 15 (3): 719-732 (2016)Gaussian and non-Gaussian colored noise induced escape in a tumor-immune model., and . Commun. Inf. Syst., 22 (2): 169-186 (2022)Dynamic Changes of Terrestrial Water Cycle Components over Central Asia in the Last Two Decades from 2003 to 2020., , , , , , and . Remote. Sens., 15 (13): 3318 (July 2023)Emotional Calculation Method of Rural Tourist Based on Improved SPCA-LSTM Algorithm.. J. Sensors, (2022)Low-Latency and Resource-Efficient Service Function Chaining Orchestration in Network Function Virtualization., , , , , and . IEEE Internet Things J., 7 (7): 5760-5772 (2020)Identification of Vulnerable Lines in Smart Grid Systems Based on Affinity Propagation Clustering., , , , , and . IEEE Internet Things J., 6 (3): 5163-5171 (2019)