Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facial expression recognition based on salient patch selection., , , and . ICMLC, page 502-507. IEEE, (2016)Velocity-Free Distributed Robust Nash Equilibrium Seeking By An Uncertainty and Disturbance Estimator Based Algorithm., , , and . IECON, page 1-6. IEEE, (2022)A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers., , , and . MLSP, page 1-6. IEEE, (2023)Detecting Backdoor Attacks against Point Cloud Classifiers., , , , and . ICASSP, page 3159-3163. IEEE, (2022)Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks., , , and . ICASSP, page 3333-3337. IEEE, (2022)Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification., , and . CoRR, (2019)Evaluation of the Human Eye Glare after Strong Exposure., , and . BMEI (1), page 660-663. IEEE Computer Society, (2008)ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs., , , , , , and . CoRR, (2024)GuardAgent: Safeguard LLM Agents by a Guard Agent via Knowledge-Enabled Reasoning., , , , , , , , , and 2 other author(s). CoRR, (2024)CBD: A Certified Backdoor Detector Based on Local Dominant Probability., , and . NeurIPS, (2023)