Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks., , , , , and . J. King Saud Univ. Comput. Inf. Sci., 35 (10): 101822 (December 2023)GreedyFool: Distortion-Aware Sparse Adversarial Attack., , , , , , , and . NeurIPS, (2020)Higher Order Recurrent Networks and Grammatical Inference., , , , and . NIPS, page 380-387. Morgan Kaufmann, (1989)Extracting and Learning an Unknown Grammar with Recurrent Neural Networks., , , , , and . NIPS, page 317-324. Morgan Kaufmann, (1991)Court Detection Using Masked Perspective Fields Network., , , and . PRDC, page 342-345. IEEE, (2023)A Novel Secure Architecture for the Internet of Things., , , , , and . ICGEC, page 311-314. IEEE Computer Society, (2011)Robust Meta-learning with Sampling Noise and Label Noise via Eigen-Reptile., , , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 3662-3678. PMLR, (2022)X-Paste: Revisiting Scalable Copy-Paste for Instance Segmentation using CLIP and StableDiffusion., , , , , , , , , and 2 other author(s). ICML, volume 202 of Proceedings of Machine Learning Research, page 42098-42109. PMLR, (2023)Modeling and control of an integrated axial passive and radial active magnetic bearing system., , and . ICIA, page 682-687. IEEE, (2013)Looking under the hood of the IBM blue gene/Q network., , , , , , , , , and 4 other author(s). SC, page 69. IEEE/ACM, (2012)