Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantum generative adversarial learning in photonics., , , , , , , , , and 3 other author(s). CoRR, (2023)Experimental quantum natural gradient optimization in photonics., , , , , , , , , and 3 other author(s). CoRR, (2023)Differentially expressed genes selection via Truncated Nuclear Norm Regularization., , , , , and . BIBM, page 1851-1855. IEEE Computer Society, (2016)A generic cryptographic algorithm identification scheme based on ciphertext features., , , , , and . J. Inf. Secur. Appl., (2025)A Complete Reinforcement-Learning-Based Framework for Urban-Safety Perception., , , and . ISPRS Int. J. Geo Inf., 11 (9): 465 (2022)Improving Data Efficiency via Curating LLM-Driven Rating Systems., , , , , , , , and . CoRR, (2024)Research on registration algorithm of pyramid edge., , and . ICDIP, volume 8878 of SPIE Proceedings, page 887844. SPIE, (2013)Multiple-Model Based Defense for Deep Reinforcement Learning Against Adversarial Attack., , , and . ICANN (1), volume 12891 of Lecture Notes in Computer Science, page 42-53. Springer, (2021)Segmentation Based Backdoor Attack Detection., , , , and . ICMLC, page 298-302. IEEE, (2020)Large Language Model Unlearning via Embedding-Corrupted Prompts., , , and . NeurIPS, (2024)