Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Networked Self-adaptive Systems: An Opportunity for Configuring in the Large., , , , , , , and . ERSA, page 81-90. CSREA Press, (2009)JPEG Compliant Compression for DNN Vision., , , and . ICIP, page 1875-1879. IEEE, (2023)Thundernna: a white box adversarial attack.. CoRR, (2021)Modeling and Energy Analysis of Adversarial Perturbations in Deep Image Classification Security., , and . CWIT, page 62-67. IEEE, (2022)An Unsupervised User Behavior Prediction Algorithm Based on Machine Learning and Neural Network For Smart Home., , , , and . IEEE Access, (2018)Conditional Mutual Information Constrained Deep Learning for Classification., , , , and . CoRR, (2023)Robustness Against Adversarial Attacks via Learning Confined Adversarial Polytopes., and . CoRR, (2024)Ultra-Fast Downloading of Partial Bitstreams through Ethernet., , , , and . ARCS, volume 5455 of Lecture Notes in Computer Science, page 72-83. Springer, (2009)Rapid Application Development on Multi-processor Reconfigurable Systems., , and . FPL, page 285-290. IEEE Computer Society, (2010)Self-reconfigurable Embedded Systems: From Modeling to Implementation., , , , , , , and . ERSA, page 84-96. CSREA Press, (2010)