From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information., , , , , , , , и . CCS, стр. 86-107. ACM, (2021)Data Poisoning and Backdoor Attacks on Audio Intelligence Systems., , , , и . IEEE Commun. Mag., 61 (12): 176-182 (декабря 2023)Improving Adversarial Transferability with Ghost Samples., , , и . ECAI, том 372 из Frontiers in Artificial Intelligence and Applications, стр. 3107-3114. IOS Press, (2023)Hijacking Attacks against Neural Networks by Analyzing Training Data., , , , , , , , , и . CoRR, (2024)Adversarial Network Pruning by Filter Robustness Estimation., , , и . ICASSP, стр. 1-5. IEEE, (2023)Blockchain Meets COVID-19: A Framework for Contact Information Sharing and Risk Notification System., , , , , , , и . MASS, стр. 269-277. IEEE, (2021)Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation., , , , , , и . ACM Multimedia, стр. 826-834. ACM, (2021)Data Mining-Based Ethereum Fraud Detection., , , и . Blockchain, стр. 266-273. IEEE, (2019)A Few Seconds Can Change Everything: Fast Decision-based Attacks against DNNs., , , , и . IJCAI, стр. 3342-3350. ijcai.org, (2022)An Efficient and Scalable Consensus for Main Blockchain in the Multi-Chain Network., , , и . NaNA, стр. 365-371. IEEE, (2023)