From post

DeT: Defending Against Adversarial Examples via Decreasing Transferability.

, , , , и . CSS (1), том 11982 из Lecture Notes in Computer Science, стр. 307-322. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks., , , , и . Journal of Zhejiang University - Science C, 14 (5): 356-373 (2013)Design and Implementation of a J2EE-Based Platform for Network Teaching., , и . ICWL, том 3583 из Lecture Notes in Computer Science, стр. 49-55. Springer, (2005)Rare Category Detection Forest., , , и . KSEM, том 9403 из Lecture Notes in Computer Science, стр. 612-618. Springer, (2015)A Multiclass Classification Framework for Document Categorization., и . Document Analysis Systems, том 3872 из Lecture Notes in Computer Science, стр. 474-483. Springer, (2006)Cluster Analysis and Fuzzy Query in Ship Maintenance and Design., , , , и . ICIC (2), том 5755 из Lecture Notes in Computer Science, стр. 458-467. Springer, (2009)Mining Spread Patterns of Spatio-temporal Co-occurrences over Zones., , и . ICCSA (2), том 5593 из Lecture Notes in Computer Science, стр. 677-692. Springer, (2009)EduCoin: a Secure and Efficient Payment Solution for MOOC Environment., , , , , , и . Blockchain, стр. 490-495. IEEE, (2019)Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs., , , , , , и . AISec@CCS, стр. 85-96. ACM, (2018)Cross-Modality Mutual Learning for Enhancing Smart Contract Vulnerability Detection on Bytecode., , , и . WWW, стр. 2220-2229. ACM, (2023)Performance Measuring and Comparing of Virtual Machine Monitors., , , и . EUC (2), стр. 381-386. IEEE Computer Society, (2008)978-0-7695-3492-3.