From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Security Risks of Knowledge Graph Reasoning., , , , , , , , и . USENIX Security Symposium, стр. 3259-3276. USENIX Association, (2023)Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications., , , , , , , , и . IEEE Trans. Dependable Secur. Comput., 19 (6): 3987-4001 (2022)The Dark Side of AutoML: Towards Architectural Backdoor Search., , , , и . ICLR, OpenReview.net, (2023)High-quality matched transfer generation adversarial network for synthetic cross-material surface defect images., , , , и . Digit. Signal Process., (2024)Reasoning over Multi-view Knowledge Graphs., , , , , , и . CoRR, (2022)On the Difficulty of Defending Contrastive Learning against Backdoor Attacks., , , , , , и . CoRR, (2023)Residual learning network for accurate and stable reconstruction in Cerenkov luminescence tomography., , , , и . Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging, том 12036 из SPIE Proceedings, SPIE, (2022)AMPpred-MFA: An Interpretable Antimicrobial Peptide Predictor with a Stacking Architecture, Multiple Features, and Multihead Attention., , , и . J. Chem. Inf. Model., 64 (7): 2393-2404 (2024)An Efficient Channel Attention-Enhanced Lightweight Neural Network Model for Metal Surface Defect Detection., , , , , и . J. Circuits Syst. Comput., 32 (10): 2350178:1-2350178:16 (августа 2023)IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI., , , , , и . CoRR, (2023)