From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarial attacks in computer vision: a survey., , , и . J. Membr. Comput., 6 (2): 130-147 (июня 2024)Randomized ReLU Activation for Uncertainty Estimation of Deep Neural Networks., , , , и . CoRR, (2021)An invisible, robust copyright protection method for DNN-generated content., , , , , и . Neural Networks, (2024)QRPatch: A Deceptive Texture-Based Black-Box Adversarial Attacks with Genetic Algorithm., , , , , и . CEC, стр. 1-8. IEEE, (2024)Black-box adversarial patch attacks using differential evolution against aerial imagery object detectors., , , , и . Eng. Appl. Artif. Intell., (2024)RFLA: A Stealthy Reflected Light Adversarial Attack in the Physical World., , , , и . ICCV, стр. 4432-4442. IEEE, (2023)HeteroMorpheus: Universal Control Based on Morphological Heterogeneity Modeling., , , , , , и . IJCNN, стр. 1-8. IEEE, (2024)A Survey on Physical Adversarial Attack in Computer Vision., , , , и . CoRR, (2022)Encoding Temporal Information for Time-Aware Link Prediction., , , , , , и . EMNLP, стр. 2350-2354. The Association for Computational Linguistics, (2016)A Multi-objective Memetic Algorithm for Auto Adversarial Attack Optimization Design., , , и . CoRR, (2022)