Author of the publication

A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy.

, , , , , , and . Comput. Secur., (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Currency Options Volatility Forecasting with Shift-Invariant Wavelet Transform and Neural Networks., and . ICONIP (3), volume 4234 of Lecture Notes in Computer Science, page 461-468. Springer, (2006)Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis., , , , and . CSIE (6), page 490-494. IEEE Computer Society, (2009)Parameter Tuning of MLP Neural Network Using Genetic Algorithms., and . ISNN (4), volume 56 of Advances in Intelligent and Soft Computing, page 121-130. Springer, (2009)Resource Management Technique Based on Lightweight and Compressed Sensing for Mobile Internet of Things., , and . J. Sensors, (2014)Research on DFF-TopK algorithm based on dynamic feature selection., , , and . ICCSE, page 493-498. IEEE, (2019)A 3R dataflow engine for restoring electrophysiological signals in telemedicine cloud platforms., , , , , , , and . Healthcom, page 486-489. IEEE, (2012)Hybrid Beamforming with Sub-arrayed MIMO Radar: Enabling Joint Sensing and Communication at mmWave Band., and . ICASSP, page 7770-7774. IEEE, (2019)Dual-functional Cellular and Radar Transmission: Beyond Coexistence., , , , , and . SPAWC, page 1-5. IEEE, (2018)Why do users switch to a disruptive technology? An empirical study based on expectation-disconfirmation theory., and . Inf. Manag., 51 (2): 240-248 (2014)Application of Improved Multi-Threshold Birch Clustering in Reservoir Prediction., , , and . ICSAI, page 1509-1514. IEEE, (2019)