Author of the publication

Generalizing Universal Adversarial Attacks Beyond Additive Perturbations.

, , , and . ICDM, page 1412-1417. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unobtrusive Posture Recognition via Online Learning of Multi-dimensional RFID Received Signal Strength., , , , , and . ICPADS, page 116-123. IEEE Computer Society, (2015)EV Charging Recommendation Concerning Preemptive Service and Charging Urgency Policy., , , , , and . VTC Fall, page 1-5. IEEE, (2020)Adversarial Driving: Attacking End-to-End Autonomous Driving., , , , and . IV, page 1-7. IEEE, (2023)Adversarial Detection: Attacking Object Detection in Real Time., , , , and . IV, page 1-7. IEEE, (2023)AdaCare: Explainable Clinical Health Status Representation Learning via Scale-Adaptive Feature Extraction and Recalibration., , , , , , , , and . CoRR, (2019)Interpretable Machine Learning for COVID-19: An Empirical Study on Severity Prediction Task., , , , , , , , and . CoRR, (2020)Bridging formal methods and machine learning with model checking and global optimisation., , , , , and . J. Log. Algebraic Methods Program., (February 2024)CovidCare: Transferring Knowledge from Existing EMR to Emerging Epidemic for Interpretable Prognosis., , , , , , , , , and . CoRR, (2020)ConCare: Personalized Clinical Feature Embedding via Capturing the Healthcare Context., , , , , , , , and . AAAI, page 833-840. AAAI Press, (2020)Generalizing Universal Adversarial Attacks Beyond Additive Perturbations., , , and . ICDM, page 1412-1417. IEEE, (2020)