Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Black-box Adversarial Attacks Against Image Quality Assessment Models., , , , and . CoRR, (2024)Can the Inference Logic of Large Language Models be Disentangled into Symbolic Concepts?, , , , and . CoRR, (2023)An Evacuation Time Correction Method for Passenger Ships Fire Considering Passenger Panic., , , and . IEEE Access, (2022)Deep Learning for Approximate Nearest Neighbour Search: A Survey and Future Directions., , , , , , and . IEEE Trans. Knowl. Data Eng., 35 (9): 8997-9018 (September 2023)A novel watermarking framework for intellectual property protection of NLG APIs., , and . Neurocomputing, (November 2023)基于用户鼠标行为的身份认证方法 (Identity Authentication Method Based on User's Mouse Behavior)., , , and . 计算机科学, 43 (2): 148-154 (2016)Low threshold and efficient multiple exciton generation in halide perovskite nanocrystals, , , , , , , , , and . Nature Communications, 9 (1): 4197-- (2018)Does a Neural Network Really Encode Symbolic Concepts?, and . ICML, volume 202 of Proceedings of Machine Learning Research, page 20452-20469. PMLR, (2023)G2CN: Graph Gaussian Convolution Networks with Concentrated Graph Filters., , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 12782-12796. PMLR, (2022)Rotated Region Based Fully Convolutional Network for Ship Detection., , , , and . IGARSS, page 673-676. IEEE, (2018)