Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Incremental Eigenpair Computation for Graph Laplacian Matrices: Theory and Applications., , and . CoRR, (2018)Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach., , , , , , , and . ICLR (Poster), OpenReview.net, (2018)Modeling Dynamics of Malware with Incubation Period from the View of Individual., , , and . VTC Spring, page 1-5. IEEE, (2014)Is Ordered Weighted ℓ1 Regularized Regression Robust to Adversarial Perturbation? A Case Study on OSCAR., , and . GlobalSIP, page 1174-1178. IEEE, (2018)Certified Interpretability Robustness for Class Activation Mapping., , , , and . CoRR, (2023)Neural Clamping: Joint Input Perturbation and Temperature Scaling for Neural Network Calibration., , and . CoRR, (2022)Exploring the Benefits of Visual Prompting in Differential Privacy., , , , and . ICCV, page 5135-5144. IEEE, (2023)ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models., , , , and . AISec@CCS, page 15-26. ACM, (2017)A scalable attribute-aware network embedding system., , , , , and . Neurocomputing, (2019)Characterizing Adversarial Subspaces by Mutual Information., , and . AsiaCCS, page 667-669. ACM, (2019)