Author of the publication

A Large-Scale Multiple-objective Method for Black-box Attack Against Object Detection.

, , , , , , and . ECCV (4), volume 13664 of Lecture Notes in Computer Science, page 619-636. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Event-Aware Video Deraining via Multi-Patch Progressive Learning., , , , , and . IEEE Trans. Image Process., (2023)一种新的基于身份的Ad hoc认证和密钥协商方案 (New Identity-based Authentication and Key Agreement Scheme in Ad hoc Networks)., , , and . 计算机科学, 45 (6A): 380-382 (2018)Inverse Source Problems in an Inhomogeneous Medium with a Single Far-Field Pattern., and . SIAM J. Math. Anal., 52 (5): 5213-5231 (2020)Dual Similarity Regularization for Recommendation., , , , , and . PAKDD (2), volume 9652 of Lecture Notes in Computer Science, page 542-554. Springer, (2016)Less is More: Fewer Interpretable Region via Submodular Subset Selection., , , , and . ICLR, OpenReview.net, (2024)Convexification for a Coefficient Inverse Problem for a System of Two Coupled Nonlinear Parabolic Equations., , and . CoRR, (2024)Locating Multiple Multiscale Acoustic Scatterers., , and . Multiscale Model. Simul., 12 (3): 927-952 (2014)Parameter-robust multiphysics algorithms for Biot model with application in brain edema simulation., , , and . Math. Comput. Simul., (2020)First order least squares method with weakly imposed boundary condition for convection dominated diffusion problems., , , and . Comput. Math. Appl., 68 (12): 1635-1652 (2014)Link Prediction in Schema-Rich Heterogeneous Information Network., , , , and . PAKDD (1), volume 9651 of Lecture Notes in Computer Science, page 449-460. Springer, (2016)