Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting backdoor in deep neural networks via intentional adversarial perturbations., , , , , and . Inf. Sci., (July 2023)Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger., , , , , and . IEEE Trans. Ind. Informatics, 20 (3): 5004-5013 (March 2024)Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks., , , , and . AICAS, page 316-319. IEEE, (2022)Protect the Intellectual Property of Dataset against Unauthorized Use., , , , and . CoRR, (2021)Computational Assessment of Protein-protein Binding Affinity by Reversely Engineering the Energetics in Protein Complexes., , and . Genom. Proteom. Bioinform., 19 (6): 1012-1022 (2021)Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples., , , , and . Appl. Intell., 53 (6): 7298-7309 (March 2023)Computational analyses of the interactome between TNF and TNFR superfamilies., , and . Comput. Biol. Chem., (April 2023)A computational study of co-inhibitory immune complex assembly at the interface between T cells and antigen presenting cells., , and . PLoS Comput. Biol., (2021)Fast Butterfly-Core Community Search For Large Labeled Graphs., , , , , and . ICPADS, page 390-396. IEEE, (2023)Fast Butterfly-Core Community Search For Large Labeled Graphs., , , , , and . CoRR, (2024)