Author of the publication

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review.

, , , , , , and . Int. J. Autom. Comput., 17 (2): 151-178 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A model for website anomaly detection based on log analysis., , , , , and . CCIS, page 604-608. IEEE, (2014)Pebbling Number Of The Graph Dn, Cm., , and . Ars Comb., (2014)Quality control for express items based on Markov decision process., and . LISS, page 1-5. IEEE, (2016)Seed-Point Detection of Clumped Convex Objects by Short-Range Attractive Long-Range Repulsive Particle Clustering., , and . CoRR, (2018)Performance evaluation of wavelet scattering network in image texture classification in various color spaces., , , , and . CoRR, (2014)Innovation Design in Personal Center Interface of Mobile Application., , , , , , , and . HCI (19), volume 10289 of Lecture Notes in Computer Science, page 310-323. Springer, (2017)Path Splitting Selecting Strategy-Aided Successive Cancellation List Algorithm for Polar Codes., , , and . IEEE Communications Letters, 23 (3): 422-425 (2019)Cost Aware Service Placement and Load Dispatching in Mobile Cloud Systems., , , and . IEEE Trans. Computers, 65 (5): 1440-1452 (2016)A fast network coding scheme for mobile wireless sensor networks., , and . IJDSN, (2017)Multi-stage Power Scheduling Framework for Data Center with Chilled Water Storage in Energy and Regulation Markets., , , , , and . CoRR, (2020)