Author of the publication

Towards desirable decision boundary by Moderate-Margin Adversarial Training.

, , , , , , and . Pattern Recognit. Lett., (September 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Joint bit and power loading with user and stream selection in OSDM MU-MIMO broadcast channels., , , and . ICC, page 3862-3866. IEEE, (2012)Power allocation based on fast Water-Filling for energy efficient OFDM and MIMO transmissions., , , , and . GLOBECOM, page 4758-4763. IEEE, (2012)Compressive Sensing-Based Channel Estimation for FBMC-OQAM System Under Doubly Selective Channels., , , , , and . IEEE Access, (2019)Joint access point placement and channel assignment for 802.11 wireless LANs., and . IEEE Trans. Wirel. Commun., 5 (10): 2705-2711 (2006)Nonlinear Complex Support Vector Regression for Fading Channel Estimation in FBMC-OQAM System., , , and . IEEE Wirel. Commun. Lett., 8 (3): 753-756 (2019)Nonlinear Dynamic Characteristics of Wind Turbine Gear System Caused by Tooth Crack Fault., , and . Int. J. Bifurc. Chaos, 31 (10): 2150148:1-2150148:15 (2021)A Cooperative Transmission and Receiving Scheme for IDMA with Time-Reversal Technique., , and . Wirel. Pers. Commun., 58 (4): 637-656 (2011)Hierarchical multi-beam training with the presence of the sub-connected hybrid beamforming architecture., , , , and . Trans. Emerg. Telecommun. Technol., (March 2023)Deep Graph Matching and Searching for Semantic Code Retrieval., , , , , , , , and . CoRR, (2020)Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art., , , , , , , , , and 2 other author(s). Comput. Secur., (May 2023)