From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Closer Look at the Transferability of Adversarial Examples: How They Fool Different Models Differently., , , , и . WACV, стр. 1360-1368. IEEE, (2023)Identifying Computer-Translated Paragraphs using Coherence Features., , , , и . PACLIC, Association for Computational Linguistics, (2018)An approach for gait anonymization using deep learning., , , , и . WIFS, стр. 1-6. IEEE, (2017)Identifying computer-generated text using statistical analysis., , , , и . APSIPA, стр. 1504-1511. IEEE, (2017)Image-Text Out-Of-Context Detection Using Synthetic Multimodal Misinformation., , , , и . CoRR, (2024)Discriminating Between Computer-Generated Facial Images and Natural Ones Using Smoothness Property and Local Entropy., , , и . IWDW, том 9569 из Lecture Notes in Computer Science, стр. 39-50. Springer, (2015)Mitigating Backdoor Attacks using Activation-Guided Model Editing., , , , и . CoRR, (2024)LookupForensics: A Large-Scale Multi-Task Dataset for Multi-Phase Image-Based Fact Verification., , , , и . CoRR, (2024)Security of Facial Forensics Models Against Adversarial Attacks., , , , и . ICIP, стр. 2236-2240. IEEE, (2020)Generation and Detection of Media Clones., , , , , , , , , и 2 other автор(ы). IEICE Trans. Inf. Syst., 104-D (1): 12-23 (2021)