Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning to Characterize Adversarial Subspaces., , , , and . ICASSP, page 2438-2442. IEEE, (2020)Self-Supervised Adversarial Training., , , , , , , , and . ICASSP, page 2218-2222. IEEE, (2020)Context-Aware Robust Fine-Tuning., , , , , and . CoRR, (2022)MambaGesture: Enhancing Co-Speech Gesture Generation with Mamba and Disentangled Multi-Modality Fusion., , , , , , , , , and . CoRR, (2024)Model Inversion Attack via Dynamic Memory Learning., , , , , , and . ACM Multimedia, page 5614-5622. ACM, (2023)Revisiting and Exploring Efficient Fast Adversarial Training via LAW: Lipschitz Regularization and Auto Weight Averaging., , , , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)On-line and dynamic estimation of Rician fading channels in GSM-R networks., , , and . WCSP, page 1-6. IEEE, (2012)Composite Adversarial Attacks., , , , , and . AAAI, page 8884-8892. AAAI Press, (2021)Towards Robust Vision Transformer., , , , , , , and . CVPR, page 12032-12041. IEEE, (2022)Bilinear Representation for Language-based Image Editing Using Conditional Generative Adversarial Networks., , , , , and . ICASSP, page 2047-2051. IEEE, (2019)