From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Defending Adversarial Examples via DNN Bottleneck Reinforcement., , , и . ACM Multimedia, стр. 1930-1938. ACM, (2020)Copy protection system for digital home networks., , , и . IEEE Signal Process. Mag., 21 (2): 100-108 (2004)Fooling an Automatic Image Quality Estimator., , и . MediaEval, том 2882 из CEUR Workshop Proceedings, CEUR-WS.org, (2020)Towards Joint Tardos Decoding: The 'Don Quixote' Algorithm., и . Information Hiding, том 6958 из Lecture Notes in Computer Science, стр. 28-42. Springer, (2011)A New Measure of Watermarking Security Applied on QIM., и . Information Hiding, том 7692 из Lecture Notes in Computer Science, стр. 207-223. Springer, (2012)A Survey of Watermarking Security.. IWDW, том 3710 из Lecture Notes in Computer Science, стр. 201-215. Springer, (2005)Decoding fingerprints using the Markov Chain Monte Carlo method., , и . WIFS, стр. 187-192. IEEE, (2012)Estimating the probability fo false alarm for a zero-bit watermarking technique., , , и . DPS, стр. 1-8. IEEE, (2009)Randomized Smoothing Under Attack: How Good is it in Practice?, , и . ICASSP, стр. 3014-3018. IEEE, (2022)Three Bricks to Consolidate Watermarks for Large Language Models., , , , и . WIFS, стр. 1-6. IEEE, (2023)