Author of the publication

CMD: classification-based memory deduplication through page access characteristics.

, , , , , and . VEE, page 65-76. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heuristic Black-Box Adversarial Attacks on Video Recognition Models., , , , , , and . AAAI, page 12338-12345. AAAI Press, (2020)Guiding Enterprise Informatization with System Theory., and . JCAI, page 609-612. IEEE Computer Society, (2009)Downstream Task-agnostic Transferable Attacks on Language-Image Pre-training Models., , , , , and . ICME, page 2831-2836. IEEE, (2023)FeSTwo, a two-step feature selection algorithm based on feature engineering and sampling for the chronological age regression problem., , , , , and . Comput. Biol. Medicine, (2020)CMD: classification-based memory deduplication through page access characteristics., , , , , and . VEE, page 65-76. ACM, (2014)Incorporating Locality of Images to Generate Targeted Transferable Adversarial Examples., , , and . CoRR, (2022)Knowledge driven weights estimation for large-scale few-shot image recognition., , , , , and . Pattern Recognit., (October 2023)Enhancing the Self-Universality for Transferable Targeted Attacks., , , and . CVPR, page 12281-12290. IEEE, (2023)GCMA: Generative Cross-Modal Transferable Adversarial Attacks from Images to Videos., , , , and . ACM Multimedia, page 698-708. ACM, (2023)ReToMe-VA: Recursive Token Merging for Video Diffusion-based Unrestricted Adversarial Attack., , , , , , , and . CoRR, (2024)