Author of the publication

Imitated Detectors: Stealing Knowledge of Black-box Object Detectors.

, , , , , and . ACM Multimedia, page 4839-4847. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning to Optimize Permutation Flow Shop Scheduling via Graph-based Imitation Learning., , , , , , and . CoRR, (2022)Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection., , , , and . CoRR, (2022)Improving Robust Fairness via Balance Adversarial Training., , , , , , , and . CoRR, (2022)Imitated Detectors: Stealing Knowledge of Black-box Object Detectors., , , , , and . ACM Multimedia, page 4839-4847. ACM, (2022)Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON System in Industrial Internet Based on Compressed Sensing., , , , and . ICC Workshops, page 1189-1194. IEEE, (2022)X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection., , , , , , , , and . USENIX Security Symposium, page 3781-3798. USENIX Association, (2023)Exploring the Relationship between Architecture and Adversarially Robust Generalization., , , , , and . CoRR, (2022)Exploring Inconsistent Knowledge Distillation for Object Detection with Data Augmentation., , , , , and . ACM Multimedia, page 768-778. ACM, (2023)LMS Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON Systems in 5G-Enabled Industrial Internet., , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)CoMUX: Combinatorial-Coding-Based High-Performance Microfluidic Control Multiplexer Design., , , , and . ICCAD, page 116:1-116:9. ACM, (2022)