Author of the publication

Towards Defending Multiple ℓ p-Norm Bounded Adversarial Perturbations via Gated Batch Normalization.

, , , , , , and . Int. J. Comput. Vis., 132 (6): 1881-1898 (June 2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy Protection., , , , , , and . CoRR, (2022)Introduction to the Special Section on Contextual Object Analysis in Complex Scenes., , , and . IEEE Trans. Circuits Syst. Video Technol., 30 (10): 3297-3300 (2020)Temporal Speciation Network for Few-Shot Object Detection., , , , , , and . IEEE Trans. Multim., (2023)Selective Focus: Investigating Semantics Sensitivity in Post-training Quantization for Lane Detection., , , , , , and . AAAI, page 11936-11943. AAAI Press, (2024)Dictionary Learning in Optimal Metric Space., , and . AAAI, page 4350-4357. AAAI Press, (2018)Practical Evaluation of Adversarial Robustness via Adaptive Auto Attack., , , , , and . CVPR, page 15084-15093. IEEE, (2022)Attention Convolutional Binary Neural Tree for Fine-Grained Visual Categorization., , , , , , , and . CVPR, page 10465-10474. Computer Vision Foundation / IEEE, (2020)Bias-Based Universal Adversarial Patch Attack for Automatic Check-Out., , , , , and . ECCV (13), volume 12358 of Lecture Notes in Computer Science, page 395-410. Springer, (2020)Search by mobile image based on visual and spatial consistency., , , and . ICME, page 1-6. IEEE Computer Society, (2011)Deep Joint Semantic-Embedding Hashing., , , , and . IJCAI, page 2397-2403. ijcai.org, (2018)