Author of the publication

Defence Against Adversarial Attacks Using Clustering Algorithm.

, , , , , and . ICPCSEE (1), volume 1058 of Communications in Computer and Information Science, page 323-333. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Permutation polynomials from piecewise functions., and . Finite Fields Their Appl., (2015)DSOR: A Traffic-Differentiated Secure opportunistic Routing with Game Theoretic Approach in MANETs., , , , and . ISCC, page 1-6. IEEE, (2019)A Note on a Class of Permutation Polynomials.. EIDWT, page 302-306. IEEE Computer Society, (2013)A Team CGA Learning Method TCCLA., and . CAR, page 77-80. IEEE Computer Society, (2009)Defence Against Adversarial Attacks Using Clustering Algorithm., , , , , and . ICPCSEE (1), volume 1058 of Communications in Computer and Information Science, page 323-333. Springer, (2019)A Path Planning Algorithm of Maintaining CGF Team Formation., , , and . CSIE (4), page 683-686. IEEE Computer Society, (2009)Leave-one-out cross-validation-based model selection for multi-input multi-output support vector machine., , , and . Neural Comput. Appl., 24 (2): 441-451 (2014)A multi-agent path planning algorithm based on hierarchical reinforcement learning and artificial potential field., , , and . ICNC, page 363-369. IEEE, (2015)A Note on Two Constructions of Zero-Difference Balanced Functions., , , and . CoRR, (2018)Research on multi-agent collaborative hunting algorithm based on game theory and Q-learning for a single escaper., , and . J. Intell. Fuzzy Syst., 40 (1): 205-219 (2021)