Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Excitation Characteristics of Ultrasonic Probe., , , , and . I2MTC, page 1-6. IEEE, (2019)GDUFS at Slot Filling TAC-KBP 2012., , , , and . TAC, NIST, (2012)Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy., , and . ACM Trans. Knowl. Discov. Data, 18 (2): 46:1-46:24 (February 2024)Toward discourse involution within China's Internet: Class, voice, and social media., , , , and . New Media Soc., 24 (5): 1033-1052 (2022)High-concurrency Solution for Intelligent Connected Vehicle Race Based on Cloud Computing., , , , , , , and . ICCEIC, volume 3344 of CEUR Workshop Proceedings, page 90-98. CEUR-WS.org, (2022)Towards Generating Adversarial Examples on Mixed-type Data., , , , , , and . CoRR, (2022)Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection., , and . SDM, page 693-701. SIAM, (2022)Denoising Self-Attentive Sequential Recommendation., , , , , , , , and . RecSys, page 92-101. ACM, (2022)Improving end-to-end delay upper bounds on an AFDX network by integrating offsets in worst-case analysis., , and . ETFA, page 1-8. IEEE, (2010)Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks., , , , and . IJCNN, page 1-8. IEEE, (2021)