From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Diversifying product search results., , , , и . SIGIR, стр. 1093-1094. ACM, (2011)Research on Stock Price Prediction Based on Catastrophe Theory., , и . CIPAE, стр. 1520-1524. ACM, (2021)Boosting the sensing granularity of acoustic signals by exploiting hardware non-linearity., , , и . HotNets, стр. 53-59. ACM, (2022)Guarding Deep Learning Systems With Boosted Evasion Attack Detection and Model Update., , , и . IEEE Internet Things J., 11 (6): 9382-9391 (марта 2024)GERALT: Real-time Detection of Evasion Attacks in Deep Learning Systems., и . ISCAS, стр. 1-5. IEEE, (2023)Eager pruning: algorithm and architecture support for fast training of deep neural networks., , , и . ISCA, стр. 292-303. ACM, (2019)Targeted Universal Adversarial Attack on Deep Hash Networks., , и . ICMR, стр. 165-174. ACM, (2024)Evolving filter criteria for randomly initialized network pruning in image classification., , , , , , , и . Neurocomputing, (2024)Dandelion: Boosting DNN Usability Under Dataset Scarcity., , и . IEEE Trans. Computers, 71 (10): 2487-2498 (2022)AroMa: Evaluating Deep Learning Systems for Stealthy Integrity Attacks on Multi-tenant Accelerators., , , и . ACM J. Emerg. Technol. Comput. Syst., 19 (2): 13:1-13:17 (апреля 2023)