From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Interpretable Deep Neural Networks by Leveraging Adversarial Examples., , , и . CoRR, (2017)Towards generalizable detection of face forgery via self-guided model-agnostic learning., , , , , и . Pattern Recognit. Lett., (2022)Bag of Tricks for Adversarial Training., , , , и . CoRR, (2020)Rethinking Model Ensemble in Transfer-based Adversarial Attacks., , , и . CoRR, (2023)Understanding the Robustness of 3D Object Detection with Bird's-Eye-View Representations in Autonomous Driving., , , , , , , и . CoRR, (2023)Towards Transferable Targeted 3D Adversarial Attack in the Physical World., , , , , и . CoRR, (2023)AutoDA: Automated Decision-based Iterative Adversarial Attacks., , , , и . USENIX Security Symposium, стр. 3557-3574. USENIX Association, (2022)Black-box Detection of Backdoor Attacks with Limited Information and Data., , , , , , и . ICCV, стр. 16462-16471. IEEE, (2021)Benchmarking Robustness of 3D Object Detection to Common Corruptions in Autonomous Driving., , , , , , , , и . CVPR, стр. 1022-1032. IEEE, (2023)Two Coupled Rejection Metrics Can Tell Adversarial Examples Apart., , , , , , , и . CVPR, стр. 15202-15212. IEEE, (2022)