Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Soften to Defend: Towards Adversarial Robustness via Self-Guided Label Refinement., , , , , and . CoRR, (2024)Structural Health Monitoring Based on RealAdaBoost Algorithm in Wireless Sensor Networks., , , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 236-245. Springer, (2014)Adversarial robustness via attention transfer., , , , , and . Pattern Recognit. Lett., (2021)Towards Adversarial Robustness via Feature Matching., , , , and . IEEE Access, (2020)Adversarial self-training for robustness and generalization., , , , and . Pattern Recognit. Lett., (2024)An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files., , , , and . Comput. Syst. Sci. Eng., 37 (2): 247-263 (2021)PCA-Based Robust Motion Data Recovery., , , , and . IEEE Access, (2020)Patchmatch: A Tool for Locating Patches of Open Source Project Vulnerabilities., , , , , and . ICSE Companion, page 175-179. IEEE, (2023)Vehicular Ad Hoc Networks: Architectures, Research Issues, Challenges and Trends., , , , and . WASA, volume 8491 of Lecture Notes in Computer Science, page 102-113. Springer, (2014)A Generic Framework for Human Motion Recognition Based on Smartphones., , , , and . IIKI, page 299-302. IEEE Computer Society, (2015)