Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Robust Vision Transformer., , , , , , , and . CoRR, (2021)A deep learning-based quality assessment model of collaboratively edited documents: A case study of Wikipedia., , and . J. Inf. Sci., (2021)Construction of a Class of Linear Codes with Two Weights., , and . NaNA, page 362-365. IEEE, (2018)A Deep Belief Network Based Machine Learning System for Risky Host Detection., , , and . CoRR, (2018)Transaudio: Towards the Transferable Adversarial Audio Attack Via Learning Contextualized Perturbations., , , , , , , and . ICASSP, page 1-5. IEEE, (2023)Spatial-Phase Shallow Learning: Rethinking Face Forgery Detection in Frequency Domain., , , , , , , and . CVPR, page 772-781. Computer Vision Foundation / IEEE, (2021)QAIR: Practical Query-Efficient Black-Box Attacks for Image Retrieval., , , , , , , and . CVPR, page 3330-3339. Computer Vision Foundation / IEEE, (2021)A preliminarily analysis of TCM-syndrome distribution of ectopic pregnancy surgery inpatients., , , , , , and . BIBM Workshops, page 803-806. IEEE Computer Society, (2011)Adaptive Face Forgery Detection in Cross Domain., , , , , , and . ECCV (34), volume 13694 of Lecture Notes in Computer Science, page 467-484. Springer, (2022)Collaboration & Mobile Cloud-Computing: Using CoAP to Enable Resource-Sharing between Clouds of Mobile Devices., , and . CIC, page 119-124. IEEE Computer Society, (2015)