Author of the publication

Attack-words Guided Sentence Generation for Textual Adversarial Attack.

, , , , , and . DSC, page 280-287. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Review of the Electric Vehicle Charging Station Location Problem., , , and . DependSys, volume 1123 of Communications in Computer and Information Science, page 435-445. Springer, (2019)Can the Max-Min Fair Allocation Be Trustful in a Centralized Resource System?, , and . WASA (1), volume 12384 of Lecture Notes in Computer Science, page 51-64. Springer, (2020)Rust-Style Patch: A Physical and Naturalistic Camouflage Attacks on Object Detector for Remote Sensing Images., , , , , and . Remote. Sens., 15 (4): 885 (February 2023)A Multi-step Attack Detection Framework for the Power System Network., , , , , and . DSC, page 1-8. IEEE, (2022)Knowledge Graph Embedding via Adaptive Negative Subsampling., , , , , and . DSC, page 38-43. IEEE, (2023)Exploring Efficient Strategies for Minesweeper., , , , and . AAAI Workshops, volume WS-17 of AAAI Technical Report, AAAI Press, (2017)Deterministic distributed rendezvous algorithms for multi-radio cognitive radio networks., , , , and . MSWiM, page 313-320. ACM, (2014)A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks., , , , , and . iThings/GreenCom/CPSCom/SmartData, page 129-134. IEEE, (2019)Convolutional Neural Network based Timbre Classification., , , , , and . CIAT, page 186-191. ACM, (2020)Introduction to the MDATA Model., , , and . MDATA: A New Knowledge Representation Model, volume 12647 of Lecture Notes in Computer Science, Springer, (2021)