From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Masking and purifying inputs for blocking textual adversarial attacks., , , , , , и . Inf. Sci., (ноября 2023)Adversarial Examples for Chinese Text Classification., , , , , и . DSC, стр. 238-245. IEEE, (2020)Attack-words Guided Sentence Generation for Textual Adversarial Attack., , , , , и . DSC, стр. 280-287. IEEE, (2021)Word-Level Textual Adversarial Attack in the Embedding Space., , , , , и . IJCNN, стр. 1-8. IEEE, (2021)Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings., , , , , и . NLPCC (1), том 14302 из Lecture Notes in Computer Science, стр. 184-196. Springer, (2023)Ethereum fraud behavior detection based on graph neural networks., , , , , и . Computing, 105 (10): 2143-2170 (октября 2023)Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition Algorithm., , , , , и . iThings/GreenCom/CPSCom/SmartData/Cybermatics, стр. 590-596. IEEE, (2020)Fusing Security Alerts Improves Cyber-Security: An Alert Normalization Framework for Heterogeneous Devices., , , , , и . DSC, стр. 1-7. IEEE, (2023)Chinese Text Classification Based on Neural Networks and Word2vec., , , , и . DSC, стр. 284-291. IEEE, (2019)