Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Very high order WENO schemes using efficient smoothness indicators., , , and . J. Comput. Phys., (2021)Towards Efficient Task-Driven Model Reprogramming with Foundation Models., , , , , , and . CoRR, (2023)Learning defense transformations for counterattacking adversarial examples., , , and . Neural Networks, (July 2023)An Intrusion Detection Algorithm based on D-S theory and Rough Set., and . Int. J. Online Biomed. Eng., 9 (S6): 19-23 (2013)Detecting Adversarial Data by Probing Multiple Perturbations Using Expected Perturbation Score., , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 41429-41451. PMLR, (2023)HiLo: Detailed and Robust 3D Clothed Human Reconstruction with High-and Low-Frequency Information of Parametric Models., , , , , and . CoRR, (2024)Improvement of Convergence to Steady State Solutions of Euler Equations with the WENO Schemes., , and . J. Sci. Comput., 47 (2): 216-238 (2011)An Attribute-weighted Clustering Intrusion Detection Method., , , , and . J. Networks, 8 (6): 1278-1284 (2013)A high order moving boundary treatment for convection-diffusion equations., , , , and . J. Comput. Phys., (2023)A new class of central compact schemes with spectral-like resolution II: Hybrid weighted nonlinear schemes., , , and . J. Comput. Phys., (2015)