Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Adversarial Transferability with Scheduled Step Size and Dual Example., , , and . CoRR, (2023)Multi-stage Optimization based Adversarial Training., , , and . CoRR, (2021)Triangle Attack: A Query-Efficient Decision-Based Adversarial Attack., , , , , , and . ECCV (5), volume 13665 of Lecture Notes in Computer Science, page 156-174. Springer, (2022)Structure Invariant Transformation for better Adversarial Transferability., , and . ICCV, page 4584-4596. IEEE, (2023)MMA-Diffusion: MultiModal Attack on Diffusion Models., , , , and . CoRR, (2023)Robust textual embedding against word-level adversarial attacks., , and . UAI, volume 180 of Proceedings of Machine Learning Research, page 2214-2224. PMLR, (2022)Improving the Transferability of Adversarial Examples with Arbitrary Style Transfer., , , , , , and . ACM Multimedia, page 4440-4449. ACM, (2023)Improving the Transferability of Adversarial Samples by Path-Augmented Method., , , , , , , and . CVPR, page 8173-8182. IEEE, (2023)AT-GAN: A Generative Attack Model for Adversarial Transferring on Generative Adversarial Nets., , and . CoRR, (2019)Natural language adversarial defense through synonym encoding., , , and . UAI, volume 161 of Proceedings of Machine Learning Research, page 823-833. AUAI Press, (2021)