Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DBA: An Efficient Approach to Boost Transfer-Based Adversarial Attack Performance Through Information Deletion., , , , and . KSEM (2), volume 14118 of Lecture Notes in Computer Science, page 276-288. Springer, (2023)KeJia-LC: A Low-Cost Mobile Robot Platform - Champion of Demo Challenge on Benchmarking Service Robots at RoboCup 2015., , , , , and . RoboCup, volume 9513 of Lecture Notes in Computer Science, page 60-71. Springer, (2015)Convolutional Neural Network based Timbre Classification., , , , , and . CIAT, page 186-191. ACM, (2020)A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks., , , , , and . iThings/GreenCom/CPSCom/SmartData, page 129-134. IEEE, (2019)Matching Words for Out-of-distribution Detection., , , , , , , and . ICDM, page 578-587. IEEE, (2023)Label Propagation for Large Scale 3D Indoor Scenes., , and . ISVC (1), volume 9474 of Lecture Notes in Computer Science, page 253-264. Springer, (2015)Training like Playing: A Reinforcement Learning And Knowledge Graph-based framework for building Automatic Consultation System in Medical Field., , and . CoRR, (2021)Adversarial Attacks on ASR Systems: An Overview., , , , , and . CoRR, (2022)Synthetical Benchmarking of Service Robots: A First Effort on Domestic Mobile Platforms., , , , , , , and . RoboCup, volume 9513 of Lecture Notes in Computer Science, page 377-388. Springer, (2015)A General Black-box Adversarial Attack on Graph-based Fake News Detectors., , , , , and . CoRR, (2024)