Author of the publication

LSGAN-AT: enhancing malware detector robustness against adversarial examples.

, , , , and . Cybersecur., 4 (1): 38 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Reward Design via Learning Motivation-Consistent Intrinsic Rewards., , , and . CoRR, (2022)Availability-Aware Survivable Virtual Network Embedding in Optical Datacenter Networks., , , and . JOCN, 7 (12): 1160-1171 (2015)Perfusion study on Modic changes of spine based on DCE-MRI., , , , , , and . BHI, page 365-367. IEEE, (2012)Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning., , , and . ISCC, page 1-6. IEEE, (2022)Learning to Utilize Shaping Rewards: A New Approach of Reward Shaping., , , , , , , and . NeurIPS, (2020)A Novel Electrode Design in DETF with Reducing Multimode Effect., , , , and . NEMS, page 1-5. IEEE, (2018)Control and Management of Optical Inter-Satellite Network based on CCSDS Protocol (Invited)., , , , , , , , , and . ECOC, page 1-3. IEEE, (2020)Planation surface extraction and quantitative analysis based on high-resolution digital elevation models., , , and . IGARSS, page 5369-5371. IEEE, (2005)Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks., , , , , , and . IEEE/ACM Trans. Netw., 25 (2): 1220-1234 (2017)IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks., , , , and . CoRR, (2021)