From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Patronus: preventing unauthorized speech recordings with support for selective unscrambling., , , , , и . SenSys, стр. 245-257. ACM, (2020)Visual Prompting for Adversarial Robustness., , , , и . ICASSP, стр. 1-5. IEEE, (2023)Poster: Proactive ZigBee: A Novel MAC Mechanism Enabling Coordination between Wifi and ZigBee., , и . EWSN, стр. 242-243. ACM, (2019)Network Specialization via Feature-level Knowledge Distillation., , , и . CVPR Workshops, стр. 3368-3375. IEEE, (2023)DeepLoRa: Learning Accurate Path Loss Model for Long Distance Links in LPWAN., , , и . INFOCOM, стр. 1-10. IEEE, (2021)Reverse Engineering of Imperceptible Adversarial Image Perturbations., , , , , , и . ICLR, OpenReview.net, (2022)Learning to Generate Image Source-Agnostic Universal Adversarial Perturbations., , , , , , и . IJCAI, стр. 1714-1720. ijcai.org, (2022)Model Sparsification Can Simplify Machine Unlearning., , , , , , , и . CoRR, (2023)An Introduction to Bi-level Optimization: Foundations and Applications in Signal Processing and Machine Learning., , , , , и . CoRR, (2023)Towards Understanding How Self-training Tolerates Data Backdoor Poisoning., , , и . SafeAI@AAAI, том 3381 из CEUR Workshop Proceedings, CEUR-WS.org, (2023)