Author of the publication

Sparse Adversarial Attack via Perturbation Factorization.

, , , , , , and . ECCV (22), volume 12367 of Lecture Notes in Computer Science, page 35-50. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sparse Adversarial Attack via Perturbation Factorization., , , , , , and . ECCV (22), volume 12367 of Lecture Notes in Computer Science, page 35-50. Springer, (2020)Defending against adversarial examples using defense kernel network., , , , and . BMVC, page 77. BMVA Press, (2019)HLR: Generating Adversarial Examples by High-Level Representations., , , , and . ICANN (3), volume 11729 of Lecture Notes in Computer Science, page 724-730. Springer, (2019)Compressing Convolutional Neural Networks via Factorized Convolutional Filters., , , , , and . CVPR, page 3977-3986. Computer Vision Foundation / IEEE, (2019)Improved Forward-Backward Propagation to Generate Adversarial Examples., , , , , and . ICANN (3), volume 11729 of Lecture Notes in Computer Science, page 660-672. Springer, (2019)