Author of the publication

Robust Detection for Adversarial Attacks - Based on a Graph Neural Network for Web Application Security Protection System.

, , , , , and . ICAICE, page 927-932. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Saliency Detection for Unconstrained Videos Using Superpixel-Level Graph and Spatiotemporal Propagation., , , , and . IEEE Trans. Circuits Syst. Video Techn., 27 (12): 2527-2542 (2017)A Dynamic Processing Algorithm for Variable Data in Intranet Security Monitoring., , , and . ICAIS (2), volume 12737 of Lecture Notes in Computer Science, page 147-156. Springer, (2021)A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication., , and . TrustCom, page 992-999. IEEE, (2022)Enhancing Security of Certificate Authorities by Blockchain-based Domain Transparency., , , and . ICPADS, page 304-311. IEEE, (2022)A Novel PD Detection Technique for Use in GIS Based on a Combination of UHF and Optical Sensors., , , , and . IEEE Trans. Instrum. Meas., 68 (8): 2890-2897 (2019)Comparing Spark vs MPI/OpenMP On Word Count MapReduce.. CoRR, (2018)Spatiotemporal saliency detection based on superpixel-level trajectory., , , , and . Signal Process. Image Commun., (2015)Revealing complexities when adult readers engage in the credibility evaluation of social media posts., , , , , , , , and . Comput. Hum. Behav., (February 2024)Long-Distance Avian Identification Approach Based on High-Frame-Rate Video., , and . CASE, page 1-7. IEEE, (2023)Data Reconstruction from Gradient Updates in Federated Learning., , , , , and . ML4CS (1), volume 13655 of Lecture Notes in Computer Science, page 586-596. Springer, (2022)