From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?, , , , , , и . ICLR, OpenReview.net, (2022)Generating 3D Adversarial Point Clouds., , и . CVPR, стр. 9136-9144. Computer Vision Foundation / IEEE, (2019)MultiRobustBench: Benchmarking Robustness Against Multiple Attacks., , , , , и . ICML, том 202 из Proceedings of Machine Learning Research, стр. 6760-6785. PMLR, (2023)A Two-Stage Formation Flying Strategy to Reduce the Mission Time., и . SoSE, стр. 1-4. IEEE, (2007)Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment., , , , , , и . IIH-MSP, стр. 322-326. IEEE, (2015)APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis., , , и . GLOBECOM, стр. 1-7. IEEE, (2018)No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization., , , , , , , и . IWQoS, стр. 42:1-42:10. ACM, (2019)DetectorGuard: Provably Securing Object Detectors against Localized Patch Hiding Attacks., и . CCS, стр. 3177-3196. ACM, (2021)Industrial Control System Fingerprinting and Anomaly Detection., , , , и . Critical Infrastructure Protection, том 466 из IFIP Advances in Information and Communication Technology, стр. 73-85. Springer, (2015)Diversification cones, trade costs and factor market linkages. Journal of International Economics, 71 (2): 448--466 (апреля 2007)