Author of the publication

Efficient Black-Box Adversarial Attack Guided by the Distribution of Adversarial Perturbations.

, , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint Face Completion and Super-resolution using Multi-scale Feature Relation Learning., , , , and . CoRR, (2020)Handling missing labels and class imbalance challenges simultaneously for facial action unit recognition., , , , and . Multimedia Tools Appl., 78 (14): 20309-20332 (2019)A Coupled Hidden Conditional Random Field Model for Simultaneous Face Clustering and Naming in Videos., , , , and . IEEE Trans. Image Processing, 25 (12): 5780-5792 (2016)Tencent ML-Images: A Large-Scale Multi-Label Image Database for Visual Representation Learning., , , , , , and . IEEE Access, (2019)Effective and Robust Detection of Adversarial Examples via Benford-Fourier Coefficients., , , , and . Mach. Intell. Res., 20 (5): 666-682 (October 2023)Groupwise Ranking Loss for Multi-Label Learning., , , , , and . IEEE Access, (2020)VDC: Versatile Data Cleanser for Detecting Dirty Samples via Visual-Linguistic Inconsistency., , , , and . CoRR, (2023)WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition., , , , , and . CoRR, (2024)Robust Physical-World Attacks on Face Recognition., , , , , and . CoRR, (2021)Adversarial Machine Learning: A Systematic Survey of Backdoor Attack, Weight Attack and Adversarial Example., , , , , and . CoRR, (2023)