Author of the publication

ADV-POST: Physically Realistic Adversarial Poster for Attacking Semantic Segmentation Models in Autonomous Driving.

, , , , , , and . ICONIP (13), volume 1967 of Communications in Computer and Information Science, page 351-364. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

I-HMM-Based Multidimensional Network Security Risk Assessment., , , , , and . IEEE Access, (2020)Evading PDF Malware Classifiers with Generative Adversarial Network., , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 374-387. Springer, (2019)Network Traffic Generator Based on Distributed Agent for Large-Scale Network Emulation Environment., , and . IScIDE, volume 11266 of Lecture Notes in Computer Science, page 68-79. Springer, (2018)A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline., , , , , and . ML4CS (1), volume 12486 of Lecture Notes in Computer Science, page 519-529. Springer, (2020)An intelligent proactive defense against the client-side DNS cache poisoning attack via self-checking deep reinforcement learning., , , , , , and . Int. J. Intell. Syst., 37 (10): 8170-8197 (2022)Architecture of Network Environment for High-Risk Security Experimentation., , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 479-484. Springer, (2013)A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks., , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 344-353. Springer, (2005)A VirtualXposed-Based Inline Hooking Framework for Android Native Methods., , , , , and . SocialSec, volume 1298 of Communications in Computer and Information Science, page 245-253. Springer, (2020)A heuristic fuzz test generator for Java native interface., , , , , and . SQUADE@ESEC/SIGSOFT FSE, page 1-7. ACM, (2019)一种基于多层拓扑的大规模分布式系统结构脆弱性分析算法 (Multilayer Topology Structural Vulnerability Analysis Algorithm for Large-scale Distributed System)., , and . 计算机科学, 43 (8): 26-29 (2016)