From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Deep Auto-Encoder Based on Supervised Learning for Damaged Face Reconstruction., , , , и . ICIMCS, том 819 из Communications in Computer and Information Science, стр. 290-299. Springer, (2017)Adversarial attack via dual-stage network erosion., , , , , , , и . Comput. Secur., (2022)Development of a Moodle course for schoolchildren's table tennis learning based on Competence Motivation Theory: Its effectiveness in comparison to traditional training method., , и . Comput. Educ., 59 (2): 294-303 (2012)Learning Coated Adversarial Camouflages for Object Detectors., , , , , , , и . IJCAI, стр. 891-897. ijcai.org, (2022)Learning Indistinguishable and Transferable Adversarial Examples., , , , и . PRCV (4), том 13022 из Lecture Notes in Computer Science, стр. 152-164. Springer, (2021)Convolutional neural network feature maps selection based on LDA., , , , и . Multimedia Tools Appl., 77 (9): 10635-10649 (2018)基于监督学习深度自编码器的图像重构 (Image Reconstruction Based on Supervised Learning Deep Auto-encoder)., , , , и . 计算机科学, 45 (11): 267-271 (2018)Making Adversarial Examples More Transferable and Indistinguishable., , , , , и . CoRR, (2020)Adversarial Attack via Dual-Stage Network Erosion., , , , , и . CoRR, (2022)Mask-guided noise restriction adversarial attacks for image classification., , , , , и . Comput. Secur., (2021)