From post

Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings.

, , , , , и . NLPCC (1), том 14302 из Lecture Notes in Computer Science, стр. 184-196. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Rendezvous for Heterogeneous Interference in Cognitive Radio Networks., , , и . IEEE Trans. Wirel. Commun., 19 (1): 91-105 (2020)Adversarial Attacks on ASR Systems: An Overview., , , , , и . CoRR, (2022)How Local Information Improves Rendezvous in Cognitive Radio Networks., , , , , , , и . SECON, стр. 352-360. IEEE, (2018)A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT., , , и . Remote. Sens., 14 (24): 6371 (декабря 2022)A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX., и . Wirel. Commun. Mob. Comput., (2021)STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means., , , , , , и . Simul. Model. Pract. Theory, (2022)MF2POSE: Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss., , , , , , и . Knowl. Based Syst., (января 2024)Visually imperceptible adversarial patch attacks., , , , , , и . Comput. Secur., (2022)Nearly optimal asynchronous blind rendezvous algorithm for Cognitive Radio Networks., , , и . SECON, стр. 371-379. IEEE, (2013)Adversarial perturbation denoising utilizing common characteristics in deep feature space., , , , , , и . Appl. Intell., 54 (2): 1672-1690 (2024)