Author of the publication

Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity.

, , , , , and . IJCAI, page 3125-3133. ijcai.org, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Oscillation criteria for even-order half-linear functional differential equations with damping., , and . Appl. Math. Lett., 24 (10): 1709-1715 (2011)Towards interpreting vulnerability of object detection models via adversarial distillation., , , , , , and . J. Inf. Secur. Appl., (2023)Knowledge graph and behavior portrait of intelligent attack against path planning., , , , , and . Int. J. Intell. Syst., 37 (10): 7110-7123 (2022)Improving the invisibility of adversarial examples with perceptually adaptive perturbation., , , , , and . Inf. Sci., (July 2023)Evading PDF Malware Classifiers with Generative Adversarial Network., , , , and . CSS (1), volume 11982 of Lecture Notes in Computer Science, page 374-387. Springer, (2019)A fault-tolerant and energy-efficient continuous data protection system., , , , , and . J. Ambient Intell. Humaniz. Comput., 10 (8): 2945-2954 (2019)Oscillation of second-order nonlinear delay dynamic equations on time scales., , and . Comput. Math. Appl., 61 (8): 2342-2348 (2011)Recovering SQLite data from fragmented flash pages., , and . Ann. des Télécommunications, 74 (7-8): 451-460 (2019)Oscillatory behavior of third-order nonlinear delay dynamic equations on time scales., , and . J. Comput. Appl. Math., (2014)A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis., , , , , and . Mob. Networks Appl., 26 (4): 1493-1502 (2021)