Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hessian-Free Second-Order Adversarial Examples for Adversarial Learning., , , , , and . CoRR, (2022)Towards Speeding up Adversarial Training in Latent Spaces., , , , , , and . CoRR, (2021)TEAM: We Need More Powerful Adversarial Examples for DNNs., , , , , , and . CoRR, (2020)Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training., , , , , , and . CoRR, (2022)Improving Text Recognition using Optical and Language Model Writer Adaptation., , , , and . ICDAR, page 1175-1180. IEEE, (2019)A Named Entity Extraction System for Historical Financial Data., , , and . DAS, volume 12116 of Lecture Notes in Computer Science, page 324-340. Springer, (2020)Extracting Unique Discussions of Interests for Entrepreneurs and Managers in a Set of Business Tweets Without Any Human Bias., , , and . IEEE Access, (2023)Online handwriting trajectory reconstruction from kinematic sensors using temporal convolutional network., , , , and . Int. J. Document Anal. Recognit., 26 (3): 289-302 (September 2023)Visually imperceptible adversarial patch attacks., , , , , , and . Comput. Secur., (2022)3D Modelling Approach for Ancient Floor Plans' Quick Browsing., , and . DAS, volume 13237 of Lecture Notes in Computer Science, page 629-643. Springer, (2022)