From post

Libra-CAM: An Activation-Based Attribution Based on the Linear Approximation of Deep Neural Nets and Threshold Calibration.

, и . IJCAI, стр. 3185-3191. ijcai.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Random access success probability in full-duplex radio networks., , и . ICUFN, стр. 99-101. IEEE, (2016)CODE-SMASH: Source-Code Vulnerability Detection Using Siamese and Multi-Level Neural Architecture., , , , , и . IEEE Access, (2024)Model Stealing Defense against Exploiting Information Leak through the Interpretation of Deep Neural Nets., , и . IJCAI, стр. 710-716. ijcai.org, (2022)Similarity-Based Source Code Vulnerability Detection Leveraging Transformer Architecture: Harnessing Cross- Attention for Hierarchical Analysis., , , , , и . IEEE Access, (2024)Nearly Non-Coupling Coil Array Allowing Many Independent Channels for Magnetic Communication., , , , и . IEEE Access, (2018)Secure Capacity Analysis for Magnetic Inductive Coupling-Based SWIPT System., , , и . IEEE Access, (2018)Analysis of D2D system performance with a maximal SINR channel selection strategy., , и . ICTC, стр. 379-380. IEEE, (2014)A 110dB-CMRR 100dB-PSRR multi-channel neural-recording amplifier system using differentially regulated rejection ratio enhancement in 0.18μm CMOS., , , , , , , и . ISSCC, стр. 472-474. IEEE, (2018)Decoy Signal Based Strategic Beamforming Against High-Power Reactive Jamming., , , , и . IEEE Trans. Veh. Technol., 67 (10): 10054-10058 (2018)Tactical beamforming against high-power reactive jammer., , , и . ICUFN, стр. 92-95. IEEE, (2016)