Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

StyleFool: Fooling Video Classification Systems via Style Transfer., , , , , and . CoRR, (2022)Flow-Attention-based Spatio-Temporal Aggregation Network for 3D Mask Detection., , , , and . CoRR, (2023)The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices., , , , , and . NDSS, The Internet Society, (2023)Flight Schedule Recovery: A Simulation-Based Approach., , , , , , and . Asia Pac. J. Oper. Res., 36 (6): 1940010:1-1940010:19 (2019)Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples., , , , , , and . IEEE Trans. Cybern., 52 (8): 7427-7440 (2022)Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (5): 2074-2087 (2021)On the Neural Backdoor of Federated Generative Models in Edge Computing., , , , , and . ACM Trans. Internet Techn., 22 (2): 43:1-43:21 (2022)Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection., , , , , , , and . CoRR, (2018)Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models., , , , and . CoRR, (2019)LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer., , , , , and . CoRR, (2023)