Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Metamorphic Relation Based Adversarial Attacks on Differentiable Neural Computer., , , , , and . CoRR, (2018)STEP: A Time-Efficient Tag Searching Protocol in Large RFID Systems., , , , and . IEEE Trans. Computers, 64 (11): 3265-3277 (2015)Jacobian Adversarially Regularized Networks for Robustness., , , and . ICLR, OpenReview.net, (2020)Player Identification in Hockey Broadcast Videos., , and . Expert Syst. Appl., (2021)Pretraining ECG Data with Adversarial Masking Improves Model Generalizability for Data-Scarce Tasks., , , and . CoRR, (2022)Survey on AI Sustainability: Emerging Trends on Learning Algorithms and Research Challenges Review Article., , , , and . IEEE Comput. Intell. Mag., 18 (2): 60-77 (May 2023)Breaking Neural Reasoning Architectures With Metamorphic Relation-Based Adversarial Examples., , , , , , and . IEEE Trans. Neural Networks Learn. Syst., 33 (11): 6976-6982 (2022)RNA alternative splicing prediction with discrete compositional energy network., , , , , and . CHIL, page 193-203. ACM, (2021)CoCon: A Self-Supervised Approach for Controlled Text Generation., , , , and . ICLR, OpenReview.net, (2021)Jacobian Adversarially Regularized Networks for Robustness., , , and . CoRR, (2019)