Author of the publication

Multimodal fake news detection through data augmentation-based contrastive learning.

, , , , and . Appl. Soft Comput., (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Manipulation Planning From Demonstration Via Goal-Conditioned Prior Action Primitive Decomposition and Alignment., , , , , , , , and . IEEE Robotics Autom. Lett., 7 (2): 1387-1394 (2022)Decision Propagation Networks for Image Classification., , , , , , and . CoRR, (2019)Signature of Geometric Centroids for 3D Local Shape Description and Partial Shape Matching., , and . CoRR, (2016)Joint Visual Phrase Detection to Boost Scene Parsing., , and . ISVC (2), volume 9475 of Lecture Notes in Computer Science, page 389-399. Springer, (2015)Geometrical Consistency Modeling on B-Spline Parameter Domain for 3D Face Reconstruction From Limited Number of Wild Images., , , , , and . Frontiers Neurorobotics, (2021)Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications., , , , , and . Frontiers Neurorobotics, (2021)HEPT Attack: Heuristic Perpendicular Trial for Hard-label Attacks under Limited Query Budgets., , , , and . CIKM, page 4064-4068. ACM, (2023)The Business Cycle, Market Power, and Corporate Investment., and . ICEME, page 184-195. ACM, (2020)CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue., , , , , , , and . ICCV, page 1133-1142. IEEE, (2021)GM-Attack: Improving the Transferability of Adversarial Attacks., , , , , and . KSEM (3), volume 13370 of Lecture Notes in Computer Science, page 489-500. Springer, (2022)