Author of the publication

Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Timing and Frequency Synchronization for Cooperative Relay Networks., , , and . VTC Fall, page 1-5. IEEE, (2013)Learning Graph Embedding with Limited Labeled Data: An Efficient Sampling Approach., , , , , and . CoRR, (2020)On User Interaction Behavior as Evidence for Computer Forensic Analysis., , , and . IWDW, volume 8389 of Lecture Notes in Computer Science, page 221-231. Springer, (2013)A Novel Method of Adopting Graph Reduction for Resource Management in Parallel Computing Model., and . GreenCom/iThings/CPScom, page 2218-2220. IEEE, (2013)Topic aspect analysis for multi-document summarization., , and . CIKM, page 1545-1548. ACM, (2010)Performance Analysis of Touch-Interaction Behavior for Active Smartphone Authentication., , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 498-513 (2016)Positioning of High-speed Trains Based on PRS., , , , and . IWCMC, page 578-583. IEEE, (2022)KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems., , , , , , and . USENIX Security Symposium, page 247-264. USENIX Association, (2023)RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices., , , , , , , , and . USENIX Security Symposium, page 2225-2242. USENIX Association, (2022)A Participant-based Approach for Event Summarization Using Twitter Streams., , , and . HLT-NAACL, page 1152-1162. The Association for Computational Linguistics, (2013)