From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing Targeted Transferability Via Suppressing High-Confidence Labels., , , и . ICIP, стр. 3309-3313. IEEE, (2023)Boosting Transferability of Adversarial Example via an Enhanced Euler's Method., , , , и . ICASSP, стр. 1-5. IEEE, (2023)An Enhanced Transferable Adversarial Attack Against Object Detection., , , и . IJCNN, стр. 1-7. IEEE, (2023)Towards Undetectable Adversarial Examples: A Steganographic Perspective., , , , и . ICONIP (4), том 14450 из Lecture Notes in Computer Science, стр. 172-183. Springer, (2023)Robust median filtering forensics based on the autoregressive model of median filtered residual., , , и . APSIPA, стр. 1-9. IEEE, (2012)Revealing Traces of Image Resampling and Resampling Antiforensics., , и . Adv. Multim., (2017)Hiding Traces of Camera Anonymization by Poisson Blending., , и . ICAIS (2), том 12240 из Lecture Notes in Computer Science, стр. 98-108. Springer, (2020)DepthWise Attention: Towards Individual Channels Attention., , , и . ISCC, стр. 613-618. IEEE, (2023)Source smartphone identification for digital zoomed images., , , и . ACM TUR-C, стр. 158:1-158:6. ACM, (2019)Towards Human Keypoint Detection in Infrared Images., , , , и . ICONIP (5), том 1792 из Communications in Computer and Information Science, стр. 528-539. Springer, (2022)