Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Canonical correlation analysis networks for two-view image recognition., , , and . Inf. Sci., (2017)Sparse principle motion component for one-shot gesture recognition., , , and . ICIMCS, page 28:1-28:4. ACM, (2015)Generation-based parallel particle swarm optimization for adversarial text attacks., , , , and . Inf. Sci., (October 2023)A Survey on Canonical Correlation Analysis., , , and . IEEE Trans. Knowl. Data Eng., 33 (6): 2349-2368 (2021)IntRoute: An Integer Programming Based Approach for Best Bus Route Discovery., , , and . DASFAA (3), volume 12683 of Lecture Notes in Computer Science, page 604-607. Springer, (2021)Adversarial Deep Learning with Stackelberg Games., , and . ICONIP (4), volume 1142 of Communications in Computer and Information Science, page 3-12. Springer, (2019)Multiple Scale Canonical Correlation Analysis Networks for Two-View Object Recognition., and . ICONIP (1), volume 10634 of Lecture Notes in Computer Science, page 325-334. Springer, (2017)Large-scale Urban Cellular Traffic Generation via Knowledge-Enhanced GANs with Multi-Periodic Patterns., , , , , , , , , and 1 other author(s). KDD, page 4195-4206. ACM, (2023)Bigram and Unigram Based Text Attack via Adaptive Monotonic Heuristic Search., , , , and . AAAI, page 706-714. AAAI Press, (2021)Targeted Attention Attack on Deep Learning Models in Road Sign Recognition., , , , and . CoRR, (2020)