Author of the publication

A Poisoning Attack Against the Recognition Model Trained by the Data Augmentation Method.

, , , and . ML4CS (2), volume 12487 of Lecture Notes in Computer Science, page 550-561. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Assembly Sequence Planning Based on Hybrid Artificial Bee Colony Algorithm., , , and . Intelligent Information Processing, volume 486 of IFIP Advances in Information and Communication Technology, page 59-71. (2016)A Base for Achieving Semantics for Prolog with Cut for Correct Observables., , , and . Software Engineering Research and Practice, page 664-670. CSREA Press, (2006)A Behavioral Similarity Metric for Semantic Workflows Based on Semantic Task Adjacency Relations With Importance., , and . IEEE Access, (2017)Extend Atomic Action Definitions of DDL to Support Occlusions and Conditional Post-conditions., , and . Intelligent Information Processing, volume 340 of IFIP Advances in Information and Communication Technology, page 45-54. Springer, (2010)Guest Editorial., and . J. Softw., 6 (6): 951-952 (2011)A New Mobility Model Based on Markov Chain for MANETs., , , and . ML4CS (3), volume 12488 of Lecture Notes in Computer Science, page 203-214. Springer, (2020)Optimal Reconfiguration of High-Performance VLSI Subarrays with Network Flow., , , , and . IEEE Trans. Parallel Distributed Syst., 27 (12): 3575-3587 (2016)Toward Fast Niching Evolutionary Algorithms: A Locality Sensitive Hashing-Based Approach., , , , and . IEEE Trans. Evol. Comput., 21 (3): 347-362 (2017)Knowledge Graph Embedding by Dynamic Translation., , , , , and . IEEE Access, (2017)OPERA: Optional Dimensional Privacy-Preserving Data Aggregation for Smart Healthcare Systems., , , , and . IEEE Trans. Ind. Informatics, 19 (1): 857-866 (2023)