Author of the publication

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.

, , , , , and . ACISP, volume 12248 of Lecture Notes in Computer Science, page 268-284. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring the thermal and ionization state of the low-$z$ IGM using likelihood free inference, , , , , , , , and . (2022)cite arxiv:2207.07151Comment: 20 pages, 17 figures, accepted for publication in MNRAS.A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks., , , , , , and . Sensors, 22 (17): 6497 (2022)Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees., , , , , , and . IEEE Trans. Inf. Forensics Secur., (2024)A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-Cities., , , , and . CSoNet, volume 12575 of Lecture Notes in Computer Science, page 283-294. Springer, (2020)Phasic Content Fusing Diffusion Model with Directional Distribution Consistency for Few-Shot Model Adaption., , , , , , , , , and . ICCV, page 2406-2415. IEEE, (2023)SAMVG: A Multi-stage Image Vectorization Model with the Segment-Anything Model., , , , , and . CoRR, (2023)Sparse Black-Box Inversion Attack with Limited Information., , , , and . ICASSP, page 1-5. IEEE, (2023)High-resolution geological mapping and age determination for ILRS site characterization., , , and . IGARSS, page 4915-4916. IEEE, (2019)Hard Anomaly Detection: An Adversarial Data Augmentation Solution., , , and . ICDM (Workshops), page 1065-1075. IEEE, (2023)Coarse-to-Fine Extraction of Small-Scale Lunar Impact Craters From the CCD Images of the Chang'E Lunar Orbiters., , , and . IEEE Trans. Geosci. Remote. Sens., 57 (1): 181-193 (2019)