Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Grey system model with time lag and application to simulation of karst spring discharge., , , and . Grey Syst. Theory Appl., 1 (1): 47-56 (2011)Scholarly Book Publishers and their Promotional Activity on Twitter., and . ISSI, page 1178-1183. ISSI Society, (2019)Deep Fusion: Crafting Transferable Adversarial Examples and Improving Robustness of Industrial Artificial Intelligence of Things., , , , and . IEEE Trans. Ind. Informatics, 19 (6): 7480-7488 (June 2023)Friend-or-Foe Deep Deterministic Policy Gradient., , , , , and . SMC, page 3523-3530. IEEE, (2020)An adversarial attack on DNN-based black-box object detectors., , , , and . J. Netw. Comput. Appl., (2020)Exploring the Factors and Influence Mechanisms of User Loyalty for Generative AI., , and . DSC, page 397-400. IEEE, (2023)Demiguise Attack: Crafting Invisible Semantic Adversarial Perturbations with Perceptual Similarity., , , , , and . IJCAI, page 3125-3133. ijcai.org, (2021)Research on Information Architecture Design of Online Creative Space., , and . HCI (4), volume 10274 of Lecture Notes in Computer Science, page 539-550. Springer, (2017)A Brief Survey on Fuzzy Cognitive Maps Research., and . ICIC (3), volume 9227 of Lecture Notes in Computer Science, page 159-166. Springer, (2015)Emergency repositories network layout model and calculation., , , and . ICNC, page 2754-2758. IEEE, (2010)