Author of the publication

Invisible Adversarial Attacks on Deep Learning-Based Face Recognition Models.

, , , and . IEEE Access, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reversible joint fingerprinting and decryption based on side match vector quantization., , , and . Signal Process., (2014)Invisible Adversarial Attacks on Deep Learning-Based Face Recognition Models., , , and . IEEE Access, (2023)Automatic thresholding for defect detection.. Pattern Recognit. Lett., 27 (14): 1644-1649 (2006)Cryptensor: A Resource-Shared Co-Processor to Accelerate Convolutional Neural Network and Polynomial Convolution., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 42 (12): 4735-4748 (December 2023)Extraction and Analysis of Structural Features of Lateral Ventricle in Brain Medical Images., , and . ICGEC, page 35-38. IEEE, (2012)DoubleQExt: Hardware and Memory Efficient CNN Through Two Levels of Quantization., , , , , and . IEEE Access, (2021)Fruit Ripeness Classification with Few-Shot Learning., , , , , and . RoViSP, volume 829 of Lecture Notes in Electrical Engineering, page 715-720. Springer, (2021)Batch Contrastive Regularization for Deep Neural Network., , , , and . IJCCI, page 368-377. SCITEPRESS, (2020)Regularization of Deep Neural Network With Batch Contrastive Loss., , , , and . IEEE Access, (2021)Contrastive-Regularized U-Net for Video Anomaly Detection., , , , , and . IEEE Access, (2023)