Author of the publication

Revisiting Gradient Regularization: Inject Robust Saliency-Aware Weight Bias for Adversarial Defense.

, , , , and . IEEE Trans. Inf. Forensics Secur., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms., , , , and . USENIX Security Symposium, page 443-460. USENIX Association, (2019)On the effectiveness and applicability of mouse dynamics biometric for static authentication: A benchmark study., , , and . ICB, page 378-383. IEEE, (2012)Handedness Recognition through Keystroke-Typing Behavior in Computer Forensics Analysis., , , and . Trustcom/BigDataSE/ISPA, page 1054-1060. IEEE, (2016)Ontology-enriched multi-document summarization in disaster management., , , and . SIGIR, page 819-820. ACM, (2010)A human-centered smart home system with wearable-sensor behavior analysis., , , , , , , and . CASE, page 1112-1117. IEEE, (2016)Passive fingerprinting for wireless devices: A multi-level decision approach., , , and . ISBA, page 1-6. IEEE, (2017)Sensor-Aided Predictive Beam Tracking for mmWave Phased Array Antennas., , and . GLOBECOM Workshops, page 1-5. IEEE, (2019)A Multi-site Collaborative Sampling for Web Accessibility Evaluation., , , , , , and . ICCHP (1), volume 12376 of Lecture Notes in Computer Science, page 329-335. Springer, (2020)Robust URLLC Packet Scheduling of OFDM Systems., , and . WCNC, page 1-6. IEEE, (2020)Practical Interference Exploitation Precoding Without Symbol-by-Symbol Optimization: A Block-Level Approach., , , , and . IEEE Trans. Wirel. Commun., 22 (6): 3982-3996 (June 2023)