Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cracking Intel Sandy Bridge's Cache Hash Function., , and . CoRR, (2015)A Tale of Two Counties: How Two School Libraries in Rural Western China Serve Local Needs., , , , and . Libr. Trends, 62 (1): 205-233 (2013)Boosting the Transferability of Video Adversarial Examples via Temporal Translation., , , and . CoRR, (2021)Heuristic Black-Box Adversarial Attacks on Video Recognition Models., , , , , , and . AAAI, page 12338-12345. AAAI Press, (2020)Downstream Task-agnostic Transferable Attacks on Language-Image Pre-training Models., , , , , and . ICME, page 2831-2836. IEEE, (2023)Guiding Enterprise Informatization with System Theory., and . JCAI, page 609-612. IEEE Computer Society, (2009)Knowledge driven weights estimation for large-scale few-shot image recognition., , , , , and . Pattern Recognit., (October 2023)FeSTwo, a two-step feature selection algorithm based on feature engineering and sampling for the chronological age regression problem., , , , , and . Comput. Biol. Medicine, (2020)Incorporating Locality of Images to Generate Targeted Transferable Adversarial Examples., , , and . CoRR, (2022)Cross-Modal Transferable Adversarial Attacks from Images to Videos., , , and . CoRR, (2021)