Author of the publication

A Generic Enhancer for Backdoor Attacks on Deep Neural Networks.

, , , , , and . ICONIP (7), volume 1794 of Communications in Computer and Information Science, page 296-307. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lifestyles and Mobile Services Adoption in China., , , and . IJEBR, 10 (3): 36-53 (2014)The Adoption of Mobile Games in China: An Empirical Study., , and . ICISO, volume 426 of IFIP Advances in Information and Communication Technology, page 368-377. Springer, (2014)Set-based approach in mining sequential patterns., , , and . ISCIS, page 218-223. IEEE, (2009)A Repository Architecture for Business Process Characterizing Models., and . PoEM, volume 68 of Lecture Notes in Business Information Processing, page 162-176. Springer, (2010)A study on Chinese consumers' concern about books on online bookstores., , and . ICUIMC, page 61. ACM, (2013)LiDAR Reveals the Process of Vision-Mediated Predator-Prey Relationships., , , , , and . Remote. Sens., 14 (15): 3730 (2022)A novel zero watermark optimization algorithm based on Gabor transform and discrete cosine transform., , , , and . Concurr. Comput. Pract. Exp., (2022)Security Threats in the Data Plane of Software-Defined Networks., , , and . IEEE Netw., 32 (4): 108-113 (2018)EWOD Chip with Micro-Barrier Electrode for Simultaneous Enhanced Mixing during Transportation., , , and . Sensors, 23 (16): 7102 (August 2023)Requirements for computerized tools to design information security policies., , and . Comput. Secur., (2020)