From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Adversarial Attacks for Visual Object Tracking., , , и . ECCV (26), том 12371 из Lecture Notes in Computer Science, стр. 34-50. Springer, (2020)Energy Balanced Clustering Routing Protocol for Wireless Sensor Networks., , , , и . ICCC Workshops, стр. 137-142. IEEE, (2021)Universal Watermark Vaccine: Universal Adversarial Perturbations for Watermark Protection., , , , и . CVPR Workshops, стр. 2322-2329. IEEE, (2023)A classification algorithm based on improved meta learning and transfer learning for few-shot medical images., , , , и . IET Image Process., 17 (12): 3589-3598 (2023)Improving Adversarial Transferability by Stable Diffusion., , , , , , и . CoRR, (2023)SA-Attack: Improving Adversarial Transferability of Vision-Language Pre-training Models via Self-Augmentation., , , , , и . CoRR, (2023)Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON System in Industrial Internet Based on Compressed Sensing., , , , и . ICC Workshops, стр. 1189-1194. IEEE, (2022)Improving Robust Fairness via Balance Adversarial Training., , , , , , , и . CoRR, (2022)Exploring the Relationship between Architecture and Adversarially Robust Generalization., , , , , и . CoRR, (2022)X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection., , , , , , , , и . USENIX Security Symposium, стр. 3781-3798. USENIX Association, (2023)