Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pokerface: Partial order keeping and energy repressing method for extreme face illumination normalization., and . BTAS, page 1-8. IEEE, (2015)Gang of GANs: Generative Adversarial Networks with Maximum Margin Ranking., , and . CoRR, (2017)Pasadena: Perceptually Aware and Stealthy Adversarial Denoise Attack., , , , , , , and . CoRR, (2020)Towards Transmission-Friendly and Robust CNN Models over Cloud and Device., , , , , and . CoRR, (2022)FakeRetouch: Evading DeepFakes Detection via the Guidance of Deliberate Noise., , , , , , , and . CoRR, (2020)Coverage-Guided Fuzzing for Deep Neural Networks., , , , , , , , , and . CoRR, (2018)ArchRepair: Block-Level Architecture-Oriented Repairing for Deep Neural Networks., , , , , , and . CoRR, (2021)Improving Robustness of LiDAR-Camera Fusion Model against Weather Corruption from Fusion Strategy Perspective., , , , , , , and . CoRR, (2024)Personalization as a Shortcut for Few-Shot Backdoor Attack against Text-to-Image Diffusion Models., , , , , , , , and . AAAI, page 21169-21178. AAAI Press, (2024)Can You Spot the Chameleon? Adversarially Camouflaging Images from Co-Salient Object Detection., , , , , , , and . CVPR, page 2140-2149. IEEE, (2022)