Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Robustness of Language Models from a Geometry-aware Perspective., , , , and . ACL (Findings), page 3115-3125. Association for Computational Linguistics, (2022)Temporal-Amount Snapshot MultiGraph for Ethereum Transaction Tracking., , , , and . BlockSys, volume 1490 of Communications in Computer and Information Science, page 133-146. Springer, (2021)Apache Software Foundation Incubator Project Sustainability Dataset., , , and . MSR, page 595-599. IEEE, (2021)The Evolution of the Interplay Between Input Distributions and Linear Regions in Networks., and . CoRR, (2023)Unsupervised Euclidean Distance Attack on Network Embedding., , , , , , and . CoRR, (2019)UAP Attack for Radio Signal Modulation Classification Based on Deep Learning., , , , , and . ICCT, page 403-407. IEEE, (2023)Research on Target Tracking Algorithm Based on Siamese Neural Network., , , , and . Mob. Inf. Syst., (2021)Focus-shifting patterns of OSS developers and their congruence with call graphs., , , and . SIGSOFT FSE, page 401-412. ACM, (2014)Can Adversarial Network Attack be Defended?, , , and . CoRR, (2019)A Self-Learning Information Diffusion Model for Smart Social Networks., , , , , and . CoRR, (2018)