From post

Defence Against Adversarial Attacks Using Clustering Algorithm.

, , , , , и . ICPCSEE (1), том 1058 из Communications in Computer and Information Science, стр. 323-333. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Team CGA Learning Method TCCLA., и . CAR, стр. 77-80. IEEE Computer Society, (2009)A Note on a Class of Permutation Polynomials.. EIDWT, стр. 302-306. IEEE Computer Society, (2013)DSOR: A Traffic-Differentiated Secure opportunistic Routing with Game Theoretic Approach in MANETs., , , , и . ISCC, стр. 1-6. IEEE, (2019)Permutation polynomials from piecewise functions., и . Finite Fields Their Appl., (2015)Leave-one-out cross-validation-based model selection for multi-input multi-output support vector machine., , , и . Neural Comput. Appl., 24 (2): 441-451 (2014)A Path Planning Algorithm of Maintaining CGF Team Formation., , , и . CSIE (4), стр. 683-686. IEEE Computer Society, (2009)Defence Against Adversarial Attacks Using Clustering Algorithm., , , , , и . ICPCSEE (1), том 1058 из Communications in Computer and Information Science, стр. 323-333. Springer, (2019)A Note on Two Constructions of Zero-Difference Balanced Functions., , , и . CoRR, (2018)A multi-agent path planning algorithm based on hierarchical reinforcement learning and artificial potential field., , , и . ICNC, стр. 363-369. IEEE, (2015)Research on multi-agent collaborative hunting algorithm based on game theory and Q-learning for a single escaper., , и . J. Intell. Fuzzy Syst., 40 (1): 205-219 (2021)