From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning Transferable Adversarial Examples via Ghost Networks., , , , , и . CoRR, (2018)Adversarial Metric Attack for Person Re-identification., , , , и . CoRR, (2019)Research on the Innovative Education Practical Teaching Mode of Electronic Information for Outstanding Engineer., , , , , и . eLEOT, том 243 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 73-78. Springer, (2018)Adversarial Attacks on Monocular Depth Estimation., , , , и . CoRR, (2020)CAKES: Channel-wise Automatic KErnel Shrinking for Efficient 3D Network., , , , и . CoRR, (2020)Modeling and optimal design of fiber-optic probe for medium detection based on computer simulation., , , , , и . Clust. Comput., 22 (5): 11207-11226 (2019)AtomNAS: Fine-Grained End-to-End Neural Architecture Search., , , , , , и . CoRR, (2019)Question Classification Based on Incremental Modified Bayes., , , , и . FGCN (2), стр. 149-152. IEEE Computer Society, (2008)978-0-7695-3431-2.MoDAR: Using Motion Forecasting for 3D Object Detection in Point Cloud Sequences., , , , и . CVPR, стр. 9329-9339. IEEE, (2023)Neural Architecture Search for Lightweight Non-Local Networks., , , , , , , , , и . CVPR, стр. 10294-10303. Computer Vision Foundation / IEEE, (2020)