From post

Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Learning System.

, , , и . ML4CS (2), том 12487 из Lecture Notes in Computer Science, стр. 592-602. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Learning System., , , и . ML4CS (2), том 12487 из Lecture Notes in Computer Science, стр. 592-602. Springer, (2020)A Phase-Locking Analysis of Neuronal Firing Rhythms with Transcranial Magneto-Acoustical Stimulation Based on the Hodgkin-Huxley Neuron Model., , , , и . Frontiers Comput. Neurosci., (2017)Using pretraining and text mining methods to automatically extract the chemical scientific data., , , и . Data Technol. Appl., 56 (2): 205-222 (2022)An Android System Vulnerability Risk Evaluation Method for Heap Overflow., , , и . ES, стр. 89-96. IEEE Computer Society, (2016)An intensity-based personalized affective model., , , и . ROBIO, стр. 2212-2215. IEEE, (2007)Collaborative Filtering via Different Preference Structures., , , и . KSEM, том 10412 из Lecture Notes in Computer Science, стр. 309-321. Springer, (2017)Trusted access in wireless network on mutual interactive authentication mechanism., , , и . ChinaCom, стр. 776-781. IEEE Computer Society, (2015)Research on textual emotion recognition incorporating personality factor., , , и . ROBIO, стр. 2222-2227. IEEE, (2007)Research on a Time Difference Processing Method for RTD-Fluxgate Data Based on the Combination of the Mahalanobis Distance and Group Covariance., , , и . Sensors, 23 (22): 9223 (ноября 2023)Enhanced Correlation Power Analysis by Biasing Power Traces., , , , , и . ISC, том 9866 из Lecture Notes in Computer Science, стр. 59-72. Springer, (2016)