From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust Physical Adversarial Attack on Faster R-CNN Object Detector., , , и . CoRR, (2018)GLO-STIX: Graph-Level Operations for Specifying Techniques and Interactive eXploration., , , , , , и . IEEE Trans. Vis. Comput. Graph., 20 (12): 2320-2328 (2014)Diffusion Explainer: Visual Explanation for Text-to-image Stable Diffusion., , , , , , , , , и . CoRR, (2023)MalNet: A Large-Scale Cybersecurity Image Database of Malicious Software., , и . CoRR, (2021)Self-Supervised Pre-Training for Table Structure Recognition Transformer., , , , и . CoRR, (2024)DiffusionDB: A Large-scale Prompt Gallery Dataset for Text-to-Image Generative Models., , , , , и . CoRR, (2022)UniTable: Towards a Unified Framework for Table Structure Recognition via Self-Supervised Pretraining., , , , и . CoRR, (2024)Detection of emerging drugs involved in overdose via diachronic word embeddings of substances discussed on social media., , , , и . J. Biomed. Informatics, (2021)Evaluating Graph Vulnerability and Robustness using TIGER., и . CoRR, (2020)M-Flash: Fast Billion-scale Graph Computation Using Block Partition Model., , , , , и . CoRR, (2015)