Author of the publication

Adversarial example generation with adabelief optimizer and crop invariance.

, , , , , and . Appl. Intell., 53 (2): 2332-2347 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基于软件行为的可信评价研究 (Research of Trustworthiness Evaluation Model Based on Software Behavior)., and . 计算机科学, 43 (1): 202-206 (2016)一种基于描述语言的软件可信发布方法研究 (Trustworthy Software Distributing Mode Based on Software Description)., , and . 计算机科学, 42 (12): 224-228 (2015)Adversarial example generation with adabelief optimizer and crop invariance., , , , , and . Appl. Intell., 53 (2): 2332-2347 (2023)Adversarial example generation with AdaBelief Optimizer and Crop Invariance., , , , and . CoRR, (2021)Random Transformation of image brightness for adversarial attack., , , and . J. Intell. Fuzzy Syst., 42 (3): 1693-1704 (2022)Random Transformation of Image Brightness for Adversarial Attack., , , and . CoRR, (2021)Malicious Android Application Detection Based on Composite Features., , and . CSAE, page 57:1-57:6. ACM, (2019)基于改进人工蜂群算法的Android恶意应用检测 (Android Malicious Application Detection Based on Improved Artificial Bee Colony Algorithms)., , , , and . 计算机科学, 46 (11A): 421-427 (2019)一种面向网络信息系统的TCP应用架构设计 (Design of TCP Application Architecture for Network-oriented Information System)., , , and . 计算机科学, 42 (10): 154-158 (2015)基于可信计算平台的审计日志安全存储系统 (Audit Log Secure Storage System Based on Trusted Computing Platform)., and . 计算机科学, 43 (6): 146-151 (2016)