Author of the publication

Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain.

, , , and . AAAI, page 9877-9885. AAAI Press, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Temporal Pyramid Network for Pedestrian Trajectory Prediction with Multi-Supervision., , , , , and . CoRR, (2020)Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF)., , and . IEEE Trans. Serv. Comput., 14 (6): 1940-1953 (2021)Trajectory Forecasting Based on Prior-Aware Directed Graph Convolutional Neural Network., , , , , , and . IEEE Trans. Intell. Transp. Syst., 23 (9): 16773-16785 (2022)Privacy-preserving and verifiable deep learning inference based on secret sharing., , , and . Neurocomputing, (2022)Image Operation Chain Detection with Machine Translation Framework., , , , , and . IEEE Trans. Multim., (2023)Temporal Pyramid Network for Pedestrian Trajectory Prediction with Multi-Supervision., , , , , and . AAAI, page 2029-2037. AAAI Press, (2021)A Unified Environmental Network for Pedestrian Trajectory Prediction., , , , and . AAAI, page 4970-4978. AAAI Press, (2024)Reducing the ciphertext expansion in image homomorphic encryption via linear interpolation technique., , , and . GlobalSIP, page 800-804. IEEE, (2015)Robust Document Image Forgery Localization Against Image Blending., , , , and . TrustCom, page 810-817. IEEE, (2022)A Transformer based Approach for Image Manipulation Chain Detection., , , , , and . ACM Multimedia, page 3510-3517. ACM, (2021)