Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Staged Method of Code Similarity Analysis for Firmware Vulnerability Detection., , , and . IEEE Access, (2019)A Value Set Analysis Refinement Approach Based on Conditional Merging and Lazy Constraint Solving., , , and . IEEE Access, (2019)Adaptive Data Transmission Method Based on Mean Fuzzy Algorithm in Ad Hoc Networks., and . Wirel. Pers. Commun., 127 (2): 1547-1564 (2022)Studious Bob Fight Back Against Jailbreaking via Prompt Adversarial Tuning., , , and . CoRR, (2024)On the Convergence and Robustness of Adversarial Training., , , , , and . CoRR, (2021)Equilibrium Image Denoising With Implicit Differentiation., , , , , and . IEEE Trans. Image Process., (2023)A Unified Contrastive Energy-based Model for Understanding the Generative Ability of Adversarial Training., , , and . ICLR, OpenReview.net, (2022)On the Generalization of Multi-modal Contrastive Learning., , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 41677-41693. PMLR, (2023)A Message Passing Perspective on Learning Dynamics of Contrastive Learning., , , , , and . ICLR, OpenReview.net, (2023)G2CN: Graph Gaussian Convolution Networks with Concentrated Graph Filters., , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 12782-12796. PMLR, (2022)