Author of the publication

Kernel Data Attack Is a Realistic Security Threat.

, , and . SecureComm, volume 164 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 135-154. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Classification Framework for Similar Music Search., , , and . WAIM Workshops, volume 7419 of Lecture Notes in Computer Science, page 240-251. Springer, (2012)Overall Loss for Deep Neural Networks., , and . PAKDD (Workshops), volume 11607 of Lecture Notes in Computer Science, page 223-231. Springer, (2019)Static-dynamic global graph representation for pedestrian trajectory prediction., , , , , and . Knowl. Based Syst., (October 2023)Composite Backdoor Attacks Against Large Language Models., , , , and . CoRR, (2023)Chattering-suppression sliding mode control of an autonomous underwater vehicle based on nonlinear disturbance observer and power function reaching law., , , , , and . Trans. Inst. Meas. Control, (2021)Dual-Band 3-Way Doherty Power Amplifier With Extended Back-Off Power and Bandwidth., , , and . IEEE Trans. Circuits Syst. II Express Briefs, 67-II (2): 270-274 (2020)Remote operated vehicle tether disturbances analysis and target tracking control., , , , and . IROS, page 103-108. IEEE, (2014)Uncalibrated Visual Servoing for Underwater Vehicle Manipulator Systems with an Eye in Hand Configuration Camera., , , , and . Sensors, 19 (24): 5469 (2019)The Development on a New Biomechatronic Prosthetic Hand Based on Under-actuated Mechanism., , , , , , , , and . IROS, page 3791-3796. IEEE, (2006)Energy efficient comparator for successive approximation register ADCs with application to wireless sensor networks., , , and . Int. J. Sens. Networks, 17 (2): 122-129 (2015)