From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Parity-Based Data Outsourcing Model for Query Authentication and Correction., , и . ICDCS, стр. 395-404. IEEE Computer Society, (2016)Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders., , , и . CoRR, (2019)Visualizing Deep Neural Networks with Interaction of Super-pixels., и . CIKM, стр. 2327-2330. ACM, (2017)Subfield Attack on NTRU by using symmetric function map., , , и . ISIT, стр. 2308-2313. IEEE, (2023)Subfield Attacks on HSVP in Ideal Lattices., , , и . Inscrypt, том 13837 из Lecture Notes in Computer Science, стр. 447-462. Springer, (2022)Detecting Adversarial Examples Through Image Transformation., , и . AAAI, стр. 4139-4146. AAAI Press, (2018)Making Images Resilient to Adversarial Example Attacks., , , и . ICANN (3), том 13531 из Lecture Notes in Computer Science, стр. 188-199. Springer, (2022)