From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

N2VSCDNNR: A Local Recommender System Based on Node2vec and Rich Information Network., , , , , , и . CoRR, (2019)Salient Feature Extractor for Adversarial Defense on Deep Neural Networks., , , , , и . CoRR, (2021)Dyn-Backdoor: Backdoor Attack on Dynamic Link Prediction., , , , и . IEEE Trans. Netw. Sci. Eng., 11 (1): 525-542 (января 2024)ROBY: Evaluating the Robustness of a Deep Model by its Decision Boundaries., , , , и . CoRR, (2020)Invisible Poisoning: Highly Stealthy Targeted Poisoning Attack., , , , , и . Inscrypt, том 12020 из Lecture Notes in Computer Science, стр. 173-198. Springer, (2019)Feature Explainable Deep Classification for Signal Modulation Recognition., , , и . IECON, стр. 3543-3548. IEEE, (2020)Adversarial Attack Detection Based on Example Semantics and Model Activation Features., , , , , , и . DSIT, стр. 1-6. IEEE, (2022)Attack and Defense Methods for Graph Vertical Federation Learning., , , , и . CSSE, стр. 175-179. ACM, (2022)Multi-robot Path Planning Based on Cooperative Co-evolution and Adaptive CGA., , , и . IAT, стр. 547-550. IEEE Computer Society, (2006)Can Adversarial Network Attack be Defended?, , , и . CoRR, (2019)