Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Snooping Attacks on Deep Reinforcement Learning., , and . CoRR, (2019)GraphFL: A Federated Learning Framework for Semi-Supervised Node Classification on Graphs., , , and . CoRR, (2020)Neural Predictor for Neural Architecture Search., , , , , and . CoRR, (2019)Automatic Routability Predictor Development Using Neural Architecture Search., , , , , , , , , and 1 other author(s). ICCAD, page 1-9. IEEE, (2021)Routing-Free Crosstalk Prediction., , , , , , , and . ICCAD, page 163:1-163:9. IEEE, (2020)Defending against GAN-based DeepFake Attacks via Transformation-aware Adversarial Faces., , , and . IJCNN, page 1-8. IEEE, (2021)Mixture Outlier Exposure: Towards Out-of-Distribution Detection in Fine-grained Environments., , , , and . WACV, page 5520-5529. IEEE, (2023)Improving Gradient Regularization using Complex-Valued Neural Networks., , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 11953-11963. PMLR, (2021)An image encryption algorithm based on chaotic system and compressive sensing., , , , and . Signal Process., (2018)Research on Multitarget Recognition and Detection Based on Computer Vision., and . J. Sensors, (2022)