Author of the publication

An Information-Theoretic Explanation for the Adversarial Fragility of AI Classifiers.

, , , and . ISIT, page 1977-1981. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Survivability of LEO Satellite Network with Guaranteed Based Approaches., , and . ISCC, page 1-6. IEEE, (2020)Task Scheduling in Heterogeneous Computing Systems Based on Machine Learning Approach., , , and . Int. J. Pattern Recognit. Artif. Intell., 34 (12): 2051012:1-2051012:13 (2020)Research of a Double Temporal Object-oriented Data Model., , , and . ICNCC, page 178-181. ACM, (2016)A Partition Matching Method for Optimal Attack Path Analysis., , and . ISPA/IUCC/BDCloud/SocialCom/SustainCom, page 120-126. IEEE, (2018)An Information-Theoretic Explanation for the Adversarial Fragility of AI Classifiers., , , and . ISIT, page 1977-1981. IEEE, (2019)Unknown source solution coherence algorithm based on uniform circular array., , and . ICISCAE, page 638-642. IEEE, (2023)A Verification Method of Industrial Metal Parts using Siamese Residual Network., , , , , and . ISIE, page 1-7. IEEE, (2021)System Architecture and Key Technologies of Internet of Vehicles Pilot Area*., , and . RCAR, page 462-468. IEEE, (2022)Intelligent Vessel Scheduling System for the Controlled inland Waterway Based CPS*., , , , and . ITSC, page 85-90. IEEE, (2022)Truth Discovery Based on Crowdsourcing., , , , and . WAIM, volume 8485 of Lecture Notes in Computer Science, page 453-458. Springer, (2014)