Author of the publication

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.

, , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Wuhan Ionospheric Oblique Backscattering Sounding System and Its Applications - A Review., , , , and . Sensors, 17 (6): 1430 (2017)HF Radio-Frequency Interference Mitigation., , , , and . IEEE Geosci. Remote. Sens. Lett., 7 (3): 479-482 (2010)A Novel Radar Waveform for Monostatic Ionosonde., , , , , , , , , and 1 other author(s). IEEE Geosci. Remote. Sens. Lett., 8 (1): 39-43 (2011)Ionospheric Kalman Filter Assimilation Based on Covariance Localization Technique., , , , and . Remote. Sens., 14 (16): 4003 (2022)A Novel Land-Based High-Frequency Geolocation System., , , , , , and . IEEE Geosci. Remote. Sens. Lett., 18 (1): 48-52 (2021)Composite Backdoor Attacks Against Large Language Models., , , , and . CoRR, (2023)Generative Watermarking Against Unauthorized Subject-Driven Image Synthesis., , , , , and . CoRR, (2023)Screen Gleaning: A Screen Reading TEMPEST Attack on Mobile Devices Exploiting an Electromagnetic Side Channel., , , , , , and . CoRR, (2020)Turn Fake into Real: Adversarial Head Turn Attacks Against Deepfake Detection., , , and . CoRR, (2023)Towards Good Practices in Evaluating Transfer Adversarial Attacks., , , , , and . CoRR, (2022)