Author of the publication

A Multi-dimensional Unified Concavity and Convexity Detection Method Based on Geometric Algebra.

, , , , , and . CGI (4), volume 14498 of Lecture Notes in Computer Science, page 188-199. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Method for Exploring and Analyzing Spatiotemporal Patterns of Traffic Congestion in Expressway Networks Based on Origin-Destination Data., , , , , , and . ISPRS Int. J. Geo Inf., 10 (5): 288 (2021)Tracing the Origin of Adversarial Attack for Forensic Investigation and Deterrence., , , , , , and . ICCV, page 4312-4321. IEEE, (2023)Learning Inverse Mappings with Adversarial Criterion., , , and . CoRR, (2018)Common Component in Black-Boxes Is Prone to Attacks., , , and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 584-604. Springer, (2021)DP2Dataset Protection by Data Poisoning., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (2): 636-649 (March 2024)Geometry and Topology Reconstruction of BIM Wall Objects from Photogrammetric Meshes and Laser Point Clouds., , , , , , , and . Remote. Sens., 15 (11): 2856 (2023)Detection and Recovery of Adversarial Attacks with Injected Attractors., , and . CoRR, (2020)Mitigating Adversarial Attacks by Distributing Different Copies to Different Buyers., , , , , and . AsiaCCS, page 704-715. ACM, (2023)Confusing and Detecting ML Adversarial Attacks with Injected Attractors., , and . AsiaCCS, page 322-336. ACM, (2022)Neural Network Inversion in Adversarial Setting via Background Knowledge Alignment., , , and . ACM Conference on Computer and Communications Security, page 225-240. ACM, (2019)