Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems., , , , and . IEEE Trans. Computers, 64 (11): 3265-3277 (2015)Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer., , , , , and . CoRR, (2018)Jacobian Adversarially Regularized Networks for Robustness., , , and . ICLR, OpenReview.net, (2020)Pretraining ECG Data with Adversarial Masking Improves Model Generalizability for Data-Scarce Tasks., , , and . CoRR, (2022)Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples., , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 33 (11): 6976-6982 (2022)Player Identification in Hockey Broadcast Videos., , and . Expert Syst. Appl., (2021)Survey on AI Sustainability: Emerging Trends on Learning Algorithms and Research Challenges Review Article., , , , and . IEEE Comput. Intell. Mag., 18 (2): 60-77 (May 2023)RNA alternative splicing prediction with discrete compositional energy network., , , , , and . CHIL, page 193-203. ACM, (2021)CoCon: A Self-Supervised Approach for Controlled Text Generation., , , , and . ICLR, OpenReview.net, (2021)Player Identification in Hockey Broadcast Videos., , and . CoRR, (2020)