From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Evaluation of Adversarial Attacks Based on DL in Communication Networks., и . DSA, стр. 251-252. IEEE, (2020)Signal Recognition Based On Federated Learning., , , и . INFOCOM Workshops, стр. 1105-1110. IEEE, (2020)Bio-inspired contour detection model based on multi-bandwidth fusion and logarithmic texture inhibition., , , и . IET Image Process., 13 (12): 2304-2313 (2019)Identification and Elimination of Abnormal Information in Electromagnetic Spectrum Cognition., , , , , и . ADHIP, том 279 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 77-88. Springer, (2018)The technology of adversarial attacks in signal recognition., , , и . Phys. Commun., (2020)An Empirical Study on Android Malware Characterization by Social Network Analysis., , , и . IEEE Trans. Reliab., 73 (1): 757-770 (марта 2024)Evaluating and Improving Adversarial Attacks on DNN-Based Modulation Recognition., , , и . GLOBECOM, стр. 1-5. IEEE, (2020)Optimized Password Recovery for Encrypted RAR on GPUs., , , , и . CoRR, (2015)Threats of Adversarial Attacks in DNN-Based Modulation Recognition., , , , и . INFOCOM, стр. 2469-2478. IEEE, (2020)Adversarial Attacks in Modulation Recognition With Convolutional Neural Networks., , , , и . IEEE Trans. Reliab., 70 (1): 389-401 (2021)