Author of the publication

Adversarial attacks on deep-learning-based SAR image target recognition.

, , , , , and . J. Netw. Comput. Appl., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contrastive distortion-level learning-based no-reference image-quality assessment., , , and . Int. J. Intell. Syst., 37 (11): 8730-8746 (2022)Task-aware swapping for efficient DNN inference on DRAM-constrained edge systems., , , , , , and . Int. J. Intell. Syst., 37 (10): 8155-8169 (2022)Identification of Fuzzy Rule-Based Models With Collaborative Fuzzy Clustering., , , , , and . IEEE Trans. Cybern., 52 (7): 6406-6419 (2022)Multiuser Detection for MC-CDMA System Using an RQP Approach., and . IEICE Trans. Commun., 88-B (11): 4394-4397 (2005)Multi-sensor optical remote sensing image registration based on Line-Point Invariant., and . IGARSS, page 2364-2367. IEEE, (2016)A near-optimal multiuser detector for CDMA channels using semidefinite programming relaxation., , and . ISCAS (4), page 298-301. IEEE, (2001)A Survey of Privacy Preserving Subgraph Matching Methods., , , , , , , and . AIS&P (1), volume 14509 of Lecture Notes in Computer Science, page 98-113. Springer, (2023)An effective and practical gradient inversion attack., , , , , and . Int. J. Intell. Syst., 37 (11): 9373-9389 (2022)Feature evolvable learning with image streams., , , , and . Intell. Data Anal., 27 (4): 1047-1063 (2023)Adversarial attacks on deep-learning-based SAR image target recognition., , , , , and . J. Netw. Comput. Appl., (2020)