Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Random Feature Nullification for Adversary Resistant Deep Architecture., , , , , and . CoRR, (2016)Towards Interrogating Discriminative Machine Learning Models., , , , and . CoRR, (2017)Adversary Resistant Deep Neural Networks with an Application to Malware Detection., , , , , , and . KDD, page 1145-1153. ACM, (2017)Differentiable hierarchical and surrogate gradient search for spiking neural networks., , , , , , , and . NeurIPS, (2022)Lightweight Comprehensive Evaluation Method for Wireless User Perception Based on Random Forest., , , and . VTC Spring, page 1-5. IEEE, (2020)A high performance real-time edge detection system with NEON., , , , , , and . ASICON, page 847-850. IEEE, (2017)Verification of Recurrent Neural Networks Through Rule Extraction., , , and . CoRR, (2018)Cell Scene Division and Visualization Based on Autoencoder and K-Means Algorithm., , , , , and . IEEE Access, (2019)4D Time Density of Trajectories: Discovering Spatiotemporal Patterns in Movement Data., , , , and . ISPRS Int. J. Geo Inf., 7 (6): 212 (2018)Efficient Deep Spiking Multi-Layer Perceptrons with Multiplication-Free Inference., , , , , , and . CoRR, (2023)