Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning to Optimize Permutation Flow Shop Scheduling via Graph-based Imitation Learning., , , , , , and . CoRR, (2022)Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection., , , , and . CoRR, (2022)Improving Robust Fairness via Balance Adversarial Training., , , , , , , and . CoRR, (2022)Exploring the Relationship between Architecture and Adversarially Robust Generalization., , , , , and . CoRR, (2022)Realization of comprehensive monitoring and friendly evaluation system for gas environment of rail transit station., , , and . ICAIIS, page 147:1-147:8. ACM, (2021)Diversifying the High-level Features for better Adversarial Transferability., , , and . BMVC, page 70-76. BMVA Press, (2023)CoMUX: Combinatorial-Coding-Based High-Performance Microfluidic Control Multiplexer Design., , , , and . ICCAD, page 116:1-116:9. ACM, (2022)X-Adv: Physical Adversarial Object Attacks against X-ray Prohibited Item Detection., , , , , , , , and . USENIX Security Symposium, page 3781-3798. USENIX Association, (2023)LMS Channel Estimation Algorithm for IM/DD-OFDM/OQAM-PON Systems in 5G-Enabled Industrial Internet., , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2021)Exploring Inconsistent Knowledge Distillation for Object Detection with Data Augmentation., , , , , and . ACM Multimedia, page 768-778. ACM, (2023)