Author of the publication

Enhancing transferability of adversarial examples via rotation-invariant attacks.

, , , , , and . IET Comput. Vis., 16 (1): 1-11 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Neural Network-Based Method for Orbit Uncertainty Propagation and Estimation., , and . IEEE Trans. Aerosp. Electron. Syst., 60 (1): 1176-1193 (February 2024)Active Terminal Identification, Channel Estimation, and Signal Detection for Grant-Free NOMA-OTFS in LEO Satellite Internet-of-Things., , , , , , , and . IEEE Trans. Wirel. Commun., 22 (4): 2847-2866 (April 2023)Detecting Semantic Communities in Social Networks., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (11): 2507-2512 (2017)Detection of irregular small defects on metal base surface of infrared laser diode based on deep learning., , , , and . Multim. Tools Appl., 83 (7): 19181-19197 (2024)Iterative learning control-based tracking synchronization for linearly coupled reaction-diffusion neural networks with time delay and iteration-varying switching topology., , , and . J. Frankl. Inst., 358 (7): 3822-3846 (2021)An Algebraic Evaluation Framework for a Class of Car-Following Models., , and . IEEE Trans. Intell. Transp. Syst., 23 (8): 12366-12376 (2022)Designing Low-Complexity Heavy-Traffic Delay-Optimal Load Balancing Schemes: Theory to Algorithms., , , , and . CoRR, (2017)Distributed Differential Privacy in Multi-Armed Bandits., and . CoRR, (2022)Attributed network representation learning via DeepWalk., , , , , and . Intell. Data Anal., 23 (4): 877-893 (2019)On Private and Robust Bandits., , , and . CoRR, (2023)