Author of the publication

Fisher-Bures Adversary Graph Convolutional Networks.

, , and . UAI, volume 115 of Proceedings of Machine Learning Research, page 465-475. AUAI Press, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Mathematical Modeling of Exploitations and Mitigation Techniques Using Set Theory., , , and . IEEE Symposium on Security and Privacy Workshops, page 323-328. IEEE Computer Society, (2018)Stochastic Motion Planning Under Partial Observability for Mobile Robots With Continuous Range Measurements., , , and . IEEE Trans. Robotics, 37 (3): 979-995 (2021)Improving variational autoencoder with deep feature consistent and generative adversarial training., , , and . Neurocomputing, (2019)Task-Driven Resource Assignment in Mobile Edge Computing Exploiting Evolutionary Computation., , , , , and . IEEE Wirel. Commun., 26 (6): 94-101 (2019)Microwave Brightness Temperature Characteristics of Three Strong Earthquakes in Sichuan Province, China., , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2020)Urban Traffic Density Estimation Based on Ultrahigh-Resolution UAV Video and Deep Neural Network., , , , , , , and . IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 11 (12): 4968-4981 (2018)CamoDiffusion: Camouflaged Object Detection via Conditional Diffusion Models., , , and . CoRR, (2023)Idea and Theory of Particle Access., , , and . CoRR, (2022)Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems., , , , , and . CoRR, (2023)High-Resolution Representations for Labeling Pixels and Regions., , , , , , , , , and . CoRR, (2019)