Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complexity vs. performance: empirical analysis of machine learning as a service., , , , , and . Internet Measurement Conference, page 384-397. ACM, (2017)A novel feed rate scheduling method based on Sigmoid function with chord error and kinematics constraints., , , , , , and . CoRR, (2021)Crowds on Wall Street: Extracting Value from Social Investing Platforms., , , , , , and . CoRR, (2014)Augmented Strategy For Polyphonic Sound Event Detection., , and . APSIPA, page 1496-1500. IEEE, (2019)A fast T-spline fitting method based on efficient region segmentation., , , , , and . Comput. Appl. Math., (2020)Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks., , , , , and . CCS, page 67-83. ACM, (2020)Poster: Defending against Sybil Devices in Crowdsourced Mapping Services., , , , , and . MobiSys (Companion Volume), page 146. ACM, (2016)A Physical Process Driven Digital Terrain Model Generating Method Based on D-NURBS., , , , , , and . IEEE Access, (2020)Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks., , , , , and . CoRR, (2019)Improving and Securing Machine Learning Systems.. University of California, Santa Barbara, USA, (2018)base-search.net (ftcdlib:qt1nv8m9nb).