From post

3E-Solver: An Effortless, Easy-to-Update, and End-to-End Solver with Semi-Supervised Learning for Breaking Text-Based Captchas.

, , , , , и . IJCAI, стр. 3817-3824. ijcai.org, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Efficient Self-Healing Key Distribution with Resistance to the Collusion Attack for Wireless Sensor Networks., и . ICC, стр. 1-5. IEEE, (2010)Wiretap Channel with Information Embedding on Actions., и . Entropy, 16 (4): 2105-2130 (2014)Tracking the Mobile Jammer Continuously in Time by Using Moving Vector., , , и . ISCID (1), стр. 43-48. IEEE, (2017)A Semi-Supervised Federated Learning Scheme via Knowledge Distillation for Intrusion Detection., , , , , и . ICC, стр. 2688-2693. IEEE, (2022)Flow Sequence-Based Anonymity Network Traffic Identification with Residual Graph Convolutional Networks., , , , , , и . IWQoS, стр. 1-10. IEEE, (2022)Yet Another Traffic Classifier: A Masked Autoencoder Based Traffic Transformer with Multi-Level Flow Representation., , , , , , и . AAAI, стр. 5420-5427. AAAI Press, (2023)A Unified Host-based Intrusion Detection Framework using Spark in Cloud., , и . TrustCom, стр. 97-103. IEEE, (2020)Character-Level Intrusion Detection Based On Convolutional Neural Networks., , и . IJCNN, стр. 1-8. IEEE, (2018)Capacity-Equivocation Region Bounds for Degraded Broadcast Channel with Action-Dependent States., , , , и . CIT, стр. 263-269. IEEE Computer Society, (2014)Two Stochastic Models for Security Evaluation Based on Attack Graph., , , и . ICYCS, стр. 2198-2203. IEEE Computer Society, (2008)