Author of the publication

The Adversarial Attacks Threats on Computer Vision: A Survey.

, , , , and . MASS Workshops, page 25-30. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust differential co-expression discovery: an insight into pharmacodynamics of tyrosine kinase inhibitor., and . BCB, page 604-606. ACM, (2012)Proceedings UWeb 2011 - Workshop on User Profile Data on the Social Semantic Web in conjunction with ESWC 2011, , , , , and . (2011)Abnormal Activity Detection in Edge Computing: A Transfer Learning Approach., , , , , and . ICNC, page 107-111. IEEE, (2020)Decimal Transforming Operations in Spiking Neural P Systems., and . BMEI, page 1-5. IEEE, (2009)Inferring causal molecular networks: empirical assessment through a community-based effort, , , , , , , , , and 163 other author(s). Nature Methods, 13 (4): 310--318 (Feb 22, 2016)Efficient Multiplier and FPGA Implementation for NTRU Prime., and . CCECE, page 1-5. IEEE, (2021)Improved SQP and SLSQP algorithms for feasible path-based process optimisation., , , and . Comput. Chem. Eng., (2024)The Adversarial Attacks Threats on Computer Vision: A Survey., , , , and . MASS Workshops, page 25-30. IEEE, (2019)Digital RF-over-Fiber Links Based on Continuous-Time Delta-Sigma Modulation., , and . MWSCAS, page 259-262. IEEE, (2019)Approximation Capabilities of Neural ODEs and Invertible Residual Networks., , , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 11086-11095. PMLR, (2020)