From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EnsembleFool: A method to generate adversarial examples based on model fusion strategy., , , , , , и . Comput. Secur., (2021)Combining adaptive filtering and motion state for wearable PPG-based heart rate extraction., , , , и . CCIS, стр. 485-488. IEEE, (2023)STBA: Towards Evaluating the Robustness of DNNs for Query-Limited Black-box Scenario., , , , , , и . CoRR, (2024)Can LSH (locality-sensitive hashing) be replaced by neural network?, , , , , и . Soft Comput., 28 (2): 1041-1053 (января 2024)Model Inversion Attacks on Homogeneous and Heterogeneous Graph Neural Networks., , , , , и . CoRR, (2023)Rewriting-Stego: Generating Natural and Controllable Steganographic Text with Pre-trained Language Model., , , , , , , и . DASFAA (1), том 13943 из Lecture Notes in Computer Science, стр. 617-626. Springer, (2023)Boosting Black-box Attack to Deep Neural Networks with Conditional Diffusion Models., , , , , и . CoRR, (2023)Double-Flow-based Steganography without Embedding for Image-to-Image Hiding., , , , , и . CoRR, (2023)Can LSH (Locality-Sensitive Hashing) Be Replaced by Neural Network?, , , , , и . CoRR, (2023)SSTA: Salient Spatially Transformed Attack., , , , и . ICASSP, стр. 5910-5914. IEEE, (2024)