From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Protect the Intellectual Property of Dataset against Unauthorized Use., , , , и . CoRR, (2021)Computational analyses of the interactome between TNF and TNFR superfamilies., , и . Comput. Biol. Chem., (апреля 2023)Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples., , , , и . Appl. Intell., 53 (6): 7298-7309 (марта 2023)A computational study of co-inhibitory immune complex assembly at the interface between T cells and antigen presenting cells., , и . PLoS Comput. Biol., (2021)Fast Butterfly-Core Community Search For Large Labeled Graphs., , , , , и . CoRR, (2024)Fast Butterfly-Core Community Search For Large Labeled Graphs., , , , , и . ICPADS, стр. 390-396. IEEE, (2023)Computational Assessment of Protein-protein Binding Affinity by Reversely Engineering the Energetics in Protein Complexes., , и . Genom. Proteom. Bioinform., 19 (6): 1012-1022 (2021)Untargeted Backdoor Attack Against Deep Neural Networks With Imperceptible Trigger., , , , , и . IEEE Trans. Ind. Informatics, 20 (3): 5004-5013 (марта 2024)Detecting backdoor in deep neural networks via intentional adversarial perturbations., , , , , и . Inf. Sci., (июля 2023)Sample-Specific Backdoor based Active Intellectual Property Protection for Deep Neural Networks., , , , и . AICAS, стр. 316-319. IEEE, (2022)