Author of the publication

Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization.

, , , , , and . IEEE Trans. Multim., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stepsize Range and Optimal Value for Taylor-Zhang Discretization Formula Applied to Zeroing Neurodynamics Illustrated via Future Equality-Constrained Quadratic Programming., , , , and . IEEE Trans. Neural Networks Learn. Syst., 30 (3): 959-966 (2019)Reducing Adversarial Training Cost with Gradient Approximation.. CoRR, (2023)Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization., , , , , and . IEEE Trans. Multim., (2024)Vulnerability Detection Using Deep Learning Based Function Classification., , , , and . NSS, volume 13787 of Lecture Notes in Computer Science, page 3-22. Springer, (2022)A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)Video scene parsing: An overview of deep learning methods and datasets., , , , , , and . Comput. Vis. Image Underst., (2020)Parameter-Saving Adversarial Training: Reinforcing Multi-Perturbation Robustness via Hypernetworks., , , , , and . CoRR, (2023)Taylor-zhang discretization formula extended to time-varying four fundamental operations with numerical experiments., , , , and . IECON, page 3345-3351. IEEE, (2017)Stealthy Physical Masked Face Recognition Attack via Adversarial Style Optimization., , , , , and . CoRR, (2023)Symbolic Solutions to Division by Zero Problem via Gradient Neurodynamics., , , , and . ICONIP (3), volume 10636 of Lecture Notes in Computer Science, page 745-750. Springer, (2017)