Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Player Identification in Hockey Broadcast Videos., , and . Expert Syst. Appl., (2021)Jacobian Adversarially Regularized Networks for Robustness., , , and . ICLR, OpenReview.net, (2020)STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems., , , , and . IEEE Trans. Computers, 64 (11): 3265-3277 (2015)Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer., , , , , and . CoRR, (2018)Survey on AI Sustainability: Emerging Trends on Learning Algorithms and Research Challenges Review Article., , , , and . IEEE Comput. Intell. Mag., 18 (2): 60-77 (May 2023)Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples., , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 33 (11): 6976-6982 (2022)Pretraining ECG Data with Adversarial Masking Improves Model Generalizability for Data-Scarce Tasks., , , and . CoRR, (2022)RNA alternative splicing prediction with discrete compositional energy network., , , , , and . CHIL, page 193-203. ACM, (2021)CoCon: A Self-Supervised Approach for Controlled Text Generation., , , , and . ICLR, OpenReview.net, (2021)What it Thinks is Important is Important: Robustness Transfers through Input Gradients., , and . CoRR, (2019)