Author of the publication

Enhancing transferability of adversarial examples via rotation-invariant attacks.

, , , , , and . IET Comput. Vis., 16 (1): 1-11 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anomaly detection in traffic using L1-norm minimization extreme learning machine., , , and . Neurocomputing, (2015)Online Learning for Time Series Prediction of AR Model with Missing Data., , and . Neural Processing Letters, 50 (3): 2247-2263 (2019)Robust and Adaptive Online Time Series Prediction with Long Short-Term Memory., , and . Comput. Intell. Neurosci., (2017)Attention-enabled adaptive Markov graph convolution., , , and . Neural Comput. Appl., 36 (9): 4979-4993 (2024)Multi-View Image Clustering via Representations Fusion Method With Semi-Nonnegative Matrix Factorization., , , , and . IEEE Access, (2021)Entropy-Defined Direct Batch Growing Hierarchical Self-Organizing Mapping for Efficient Network Anomaly Detection., , , , , , and . IEEE Access, (2021)Clothes-Independent Identity Feature Learning for Long-Term Person Re-identification., , , , and . ICIG (2), volume 12889 of Lecture Notes in Computer Science, page 397-409. Springer, (2021)基于多输出学习的沪深300指数预测研究 (CSI 300 Index Prediction Research Based on Multi-output Learning)., , and . 计算机科学, 44 (Z11): 106-109 (2017)A Game-Theoretic Approach for Community Detection in Signed Networks., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (6): 796-807 (2019)Inequality-Constrained RPCA for Shadow Removal and Foreground Detection., , , , , and . IEICE Trans. Inf. Syst., 98-D (6): 1256-1259 (2015)