Author of the publication

Diverse Instance Discovery: Vision-Transformer for Instance-Aware Multi-Label Image Recognition.

, , , , , , , and . ICME, page 1-6. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Discovering and Understanding Task Hijacking in Android., , , , and . USENIX Security Symposium, page 945-959. USENIX Association, (2015)Towards Face Encryption by Generating Adversarial Identity Masks., , , , , , and . ICCV, page 3877-3887. IEEE, (2021)Human Age Estimation by Considering both the Ordinality and Similarity of Ages., , and . Neural Process. Lett., 43 (2): 505-521 (2016)A Comprehensive Study on Robustness of Image Classification Models: Benchmarking and Rethinking., , , , , , , , , and . CoRR, (2023)Towards Robust Vision Transformer., , , , , , , and . CoRR, (2021)An Effective Anomalous Sound Detection Method Based on Representation Learning with Simulated Anomalies., , , , , , and . ICASSP, page 1-5. IEEE, (2023)LightPose: A Lightweight and Efficient Model with Transformer for Human Pose Estimation., , , , and . ICASSP, page 2674-2678. IEEE, (2022)Transaudio: Towards the Transferable Adversarial Audio Attack Via Learning Contextualized Perturbations., , , , , , , and . ICASSP, page 1-5. IEEE, (2023)An Improved Edge Detection Method for Image Corrupted by Gaussian noise., and . CCTA (2), volume 294 of IFIP Advances in Information and Communication Technology, page 1153-1159. Springer, (2008)Fault analysis of distribution network with wind turbines of DFIG., , , , and . ISGT Europe, page 1-5. IEEE, (2011)