Author of the publication

Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting Anomalous Trajectories Using the Dempster-Shafer Evidence Theory Considering Trajectory Features from Taxi GNSS Data., , and . Information, 9 (10): 258 (2018)A Data Scheduling Algorithm for medical streaming in mobile P2P network., , , and . ICUFN, page 816-820. IEEE, (2016)Flow Distribution Strategy in heterogeneous networks based on satisfaction., , , and . ICUFN, page 966-971. IEEE, (2016)A Tag-Based Integrated Diffusion Model for Personalized Location Recommendation., , , , and . ICONIP (5), volume 10638 of Lecture Notes in Computer Science, page 327-337. Springer, (2017)Spectral-spatial hyperspectral image destriping using low-rank representation and Huber-Markov random fields., , , , , and . SMC, page 305-310. IEEE, (2014)Tracking of ground targets by quadrotor UAV based on UWB positioning technology., , , and . ISIE, page 676-681. IEEE, (2019)Block sparse representation for pattern classification: Theory, extensions and applications., , , and . Pattern Recognit., (2019)cPSO-CNN: An efficient PSO-based algorithm for fine-tuning hyper-parameters of convolutional neural networks., , and . Swarm Evol. Comput., (2019)Sparse Coding From a Bayesian Perspective., , and . IEEE Trans. Neural Networks Learn. Syst., 24 (6): 929-939 (2013)一种基于椭圆曲线的轻量级身份认证及密钥协商方案 (Elliptic Curve Based Light-weight Authentication and Key Agreement Scheme)., , and . 计算机科学, 42 (1): 137-141 (2015)