Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Big data statistical analysis of preset and response values of tunnel excavation parameters., , , , and . ICMLCA, page 562-567. ACM, (2023)Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security., , , , and . CoRR, (2024)LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer., , , , , and . CoRR, (2023)Three-Dimensional Coverage Optimization of Underwater Nodes Under Multiconstraints Combined With Water Flow., , , , , and . IEEE Internet Things J., 9 (3): 2375-2389 (2022)LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer., , , , , and . AAAI, page 945-953. AAAI Press, (2024)3D Face Reconstruction Using A Spectral-Based Graph Convolution Encoder., , , , , and . WWW (Companion Volume), page 633-636. ACM, (2024)Overlapping Community Detection by Local Community Gravitation in Social Networks., , , and . J. Networks, 9 (9): 2360-2364 (2014)A hybrid coverage control for enhancing UWSN localizability using IBSO-VFA., , , , , and . Ad Hoc Networks, (2021)Stable positioning for mobile targets using distributed fusion correction strategy of heterogeneous data., , , , , , and . Ad Hoc Networks, (2020)StyleFool: Fooling Video Classification Systems via Style Transfer., , , , , and . SP, page 1631-1648. IEEE, (2023)