Author of the publication

TextBugger: Generating Adversarial Text Against Real-world Applications.

, , , , and . NDSS, The Internet Society, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spreading social influence with both positive and negative opinions in online networks., , , , and . Big Data Min. Anal., 2 (2): 100-117 (2019)NeuronFair: Interpretable White-Box Fairness Testing through Biased Neuron Identification., , , , , , , , and . CoRR, (2021)Reasoning over Multi-view Knowledge Graphs., , , , , , and . CoRR, (2022)Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack., , , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 173-198. Springer, (2019)Study of clear channel assessment mechanism for ZigBee packet transmission under Wi-Fi interference., , , , and . CCNC, page 765-768. IEEE, (2013)Image Registration Algorithm for Remote Sensing Images Based on Pixel Location Information., , , , , , and . Remote. Sens., 15 (2): 436 (January 2023)DetectS ec: Evaluating the robustness of object detection models to adversarial attacks., , , , , , , , , and . Int. J. Intell. Syst., 37 (9): 6463-6492 (2022)Latency-aware computation offloading and DQN-based resource allocation approaches in SDN-enabled MEC., , and . Ad Hoc Networks, (2022)FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique., , , , , , and . Comput. Secur., (2021)RNN-Guard: Certified Robustness Against Multi-frame Attacks for Recurrent Neural Networks., , , , and . CoRR, (2023)