Author of the publication

When Diffusion Model Meets with Adversarial Attack: Generating Transferable Adversarial Examples on Face Recognition.

, , , and . ICIG (5), volume 14359 of Lecture Notes in Computer Science, page 243-255. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contactless Smart Card Experiments in a Cybersecurity Course., , and . FIE, page 1-4. IEEE, (2018)Dart: A Framework for Grid-Based Database Resource Access and Discovery., , , and . GCC (2), volume 3033 of Lecture Notes in Computer Science, page 855-862. Springer, (2003)An Efficient Edge Artificial Intelligence MultiPedestrian Tracking Method With Rank Constraint., , , , and . IEEE Trans. Ind. Informatics, 15 (7): 4178-4188 (2019)UMFA: a photorealistic style transfer method based on U-Net and multi-layer feature aggregation., , , , and . J. Electronic Imaging, (2021)Ferrite Beads Surface Defect Detection Based on Spatial Attention Under Weakly Supervised Learning., , , and . IEEE Trans. Instrum. Meas., (2023)A Novel Twin Support Vector Machine for Binary Classification Problems., , and . Neural Process. Lett., 44 (3): 795-811 (2016)LoNAS: Low-Cost Neural Architecture Search Using a Three-Stage Evolutionary Algorithm Research Frontier., , , , , and . IEEE Comput. Intell. Mag., 18 (2): 78-93 (May 2023)Learning Alternating Deep-Layer Cascaded Representation., , , and . IEEE Signal Process. Lett., (2021)Deep Metric Learning on the SPD Manifold for Image Set Classification., , , , and . IEEE Trans. Circuits Syst. Video Technol., 34 (2): 663-680 (February 2024)Decentralized Power Allocation for MIMO-NOMA Vehicular Edge Computing Based on Deep Reinforcement Learning., , , , , and . CoRR, (2021)