Author of the publication

Connecting First and Second Order Recurrent Networks with Deterministic Finite Automata.

, , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Interrogating Discriminative Machine Learning Models., , , , and . CoRR, (2017)Random Feature Nullification for Adversary Resistant Deep Architecture., , , , , and . CoRR, (2016)Adversary Resistant Deep Neural Networks with an Application to Malware Detection., , , , , , and . KDD, page 1145-1153. ACM, (2017)Lightweight Comprehensive Evaluation Method for Wireless User Perception Based on Random Forest., , , and . VTC Spring, page 1-5. IEEE, (2020)Differentiable hierarchical and surrogate gradient search for spiking neural networks., , , , , , , and . NeurIPS, (2022)A high performance real-time edge detection system with NEON., , , , , , and . ASICON, page 847-850. IEEE, (2017)WeUp: Wireless User Perception Based on Dimensional Reduction and Semi-Supervised Clustering., , , , , and . IEEE Access, (2019)Machine Learning Based Quantitative Association Rule Mining Method for Evaluating Cellular Network Performance., , , , , and . IEEE Access, (2019)Resilient control for T-S fuzzy systems with multiple transmission channels under asynchronous denial-of-Service attacks., , , and . J. Frankl. Inst., 360 (3): 2215-2233 (February 2023)Learning Adversary-Resistant Deep Neural Networks., , , , , , and . CoRR, (2016)