Author of the publication

Delving into Deep Image Prior for Adversarial Defense: A Novel Reconstruction-based Defense Framework.

, , , , , , and . ACM Multimedia, page 4564-4572. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revisiting Item Promotion in GNN-based Collaborative Filtering: A Masked Targeted Topological Attack Perspective., , and . CoRR, (2022)Video splicing detection and localization based on multi-level deep feature fusion and reinforcement learning., , , , and . Multim. Tools Appl., 81 (28): 40993-41011 (2022)LSTOP: A Light-Weight Scalable Truthful Routing Protocol in MANETs with Selfish Nodes., and . ADHOC-NOW, volume 4104 of Lecture Notes in Computer Science, page 280-293. Springer, (2006)Truthful multipath routing for ad hoc networks with selfish nodes., , and . J. Parallel Distributed Comput., 68 (6): 778-789 (2008)On supporting high-throughput routing metrics in on-demand routing protocols for multi-hop wireless networks., , and . J. Parallel Distributed Comput., 67 (10): 1108-1118 (2007)CcGAN: Continuous Conditional Generative Adversarial Networks for Image Generation., , , , and . ICLR, OpenReview.net, (2021)A Secure Position-Based Protocol Framework for Multi-hop Ad-Hoc Networks., , and . WiMob, page 55. IEEE Computer Society, (2007)Distilling and transferring knowledge via cGAN-generated samples for image classification and regression., , , , and . Expert Syst. Appl., 213 (Part C): 119060 (March 2023)FCMNet: Frequency-aware cross-modality attention networks for RGB-D salient object detection., , , , , and . Neurocomputing, (2022)The commuting graph of the cyclic extension of an abelian group., , and . Appl. Math. Comput., (2022)