Author of the publication

Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Learning System.

, , , and . ML4CS (2), volume 12487 of Lecture Notes in Computer Science, page 592-602. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing Fragmented Bandwidth in a Staggered Striping Multimedia System., and . DEXA, volume 1873 of Lecture Notes in Computer Science, page 161-170. Springer, (2000)New Entry Threats, Firm Governance, and Innovation in the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2015)New Entry Threats and Information Disclosure: Evidence from the U.S. IT Industry., , and . ICIS, Association for Information Systems, (2018)Knowledge Sharing by Students: Preference for Online Discussion Board vs Face-to-Face Class Participation., , , and . ICADL, volume 8839 of Lecture Notes in Computer Science, page 149-159. Springer, (2014)Kinematics Analysis of Leg Configuration of An Ostrich Bionic Biped Robot., , , and . RobCE, page 19-22. ACM, (2021)Reducing Garbage Collection Overhead in SSD Based on Workload Prediction., , , , , , , , , and . HotStorage, USENIX Association, (2019)Anti-vibration design and research of four-wire type vortex flow meter., , , and . I2MTC, page 1-6. IEEE, (2018)Learning-Based Computer-Aided Prescription Model for Parkinson's Disease: A Data-Driven Perspective., , , , , , , and . IEEE J. Biomed. Health Informatics, 25 (9): 3258-3269 (2021)Side-Channel Attacks Based on Collaborative Learning., , , , and . ICPCSEE (1), volume 727 of Communications in Computer and Information Science, page 549-557. Springer, (2017)Metric-Entropy Limits on Nonlinear Dynamical System Learning., , and . CoRR, (2024)