Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parametric Canonical Correlation Analysis., , and . CloudCom, page 347-353. IEEE, (2019)Generating Semantic Adversarial Examples via Feature Manipulation., , , , , and . CoRR, (2020)Deep Neural Network Quantization via Layer-Wise Optimization Using Limited Training Data., , and . AAAI, page 3329-3336. AAAI Press, (2019)Torchless: Asymmetry in a Shared Screen Dungeon Crawler., , , , , , and . CHI PLAY (Companion), page 47-53. ACM, (2016)Defending Adversarial Attacks via Semantic Feature Manipulation., , , , , , and . IEEE Trans. Serv. Comput., 15 (6): 3184-3197 (2022)Learning to Prune Deep Neural Networks via Layer-wise Optimal Brain Surgeon., , and . NIPS, page 4857-4867. (2017)Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models., , , , , and . IEEE Trans. Serv. Comput., 15 (3): 1526-1539 (2022)Adversarial Defense by Latent Style Transformations., , , , , and . CoRR, (2020)Storage Efficient and Dynamic Flexible Runtime Channel Pruning via Deep Reinforcement Learning., , and . NeurIPS, (2020)Cooperative Pruning in Cross-Domain Deep Neural Network Compression., , and . IJCAI, page 2102-2108. ijcai.org, (2019)