Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Discovering and Understanding Task Hijacking in Android., , , , and . USENIX Security Symposium, page 945-959. USENIX Association, (2015)An Improved Edge Detection Method for Image Corrupted by Gaussian noise., and . CCTA (2), volume 294 of IFIP Advances in Information and Communication Technology, page 1153-1159. Springer, (2008)Fault analysis of distribution network with wind turbines of DFIG., , , , and . ISGT Europe, page 1-5. IEEE, (2011)Human Age Estimation by Considering both the Ordinality and Similarity of Ages., , and . Neural Process. Lett., 43 (2): 505-521 (2016)A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking., , , , , , , , , and . CoRR, (2023)Towards Robust Vision Transformer., , , , , , , and . CoRR, (2021)Moving propagation of suspicious myocardial infarction from delayed enhanced cardiac imaging to CINE MRI using hybrid image registration., , , , , and . ISBI, page 1284-1288. IEEE, (2011)Linking User Identities Across Social Networks via Frequency Domain Analysis., , and . IFIP Networking, page 1-8. IEEE, (2023)Towards Face Encryption by Generating Adversarial Identity Masks., , , , , , and . ICCV, page 3877-3887. IEEE, (2021)KMUL: A User Identity Linkage Method across Social Networks Based on Spatiotemporal Data., , , , and . BigDataSE, page 111-117. IEEE, (2021)