Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Flow-Attention-based Spatio-Temporal Aggregation Network for 3D Mask Detection., , , , and . CoRR, (2023)The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices., , , , , and . NDSS, The Internet Society, (2023)QUEEN: Query Unlearning against Model Extraction., , , , , , and . CoRR, (2024)Visual Subtitle Feature Enhanced Video Outline Generation., , , , , , , , , and 3 other author(s). CoRR, (2022)Explore the hidden treasure in protein-protein interaction networks - An iterative model for predicting protein functions., and . J. Bioinform. Comput. Biol., 13 (5): 1550026:1-1550026:22 (2015)Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning., , , , , and . CoRR, (2024)STRIP: a defence against trojan attacks on deep neural networks., , , , , and . ACSAC, page 113-125. ACM, (2019)LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer., , , , , and . AAAI, page 945-953. AAAI Press, (2024)Backdoor Attack on Machine Learning Based Android Malware Detectors., , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (5): 3357-3370 (2022)The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices., , , , , and . CoRR, (2022)