Author of the publication

Generating Adversarial Examples With Shadow Model.

, , , , , and . IEEE Trans. Ind. Informatics, 18 (9): 6283-6289 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Urban Traffic Prediction Through the Second Use of Inexpensive Big Data from Buildings, , , , , and . Proceedings of the 25th ACM International on Conference on Information and Knowledge Management, page 1363--1372. New York, NY, USA, ACM, (2016)Linguistic Multi-Criteria Group Decision-Making Method Combining Cloud Model and Evidence Theory., , , and . IEICE Trans. Inf. Syst., 102-D (4): 845-855 (2019)Hyperspectral Denoising Using Unsupervised Disentangled Spatiospectral Deep Priors., , , , and . IEEE Trans. Geosci. Remote. Sens., (2022)An energy-efficient data gathering method based on compressive sensing for pervasive sensor networks., , , and . Pervasive Mob. Comput., (2017)Regular Sampling of Tensor Signals: Theory and Application to FMRI., , , and . ICASSP, page 2932-2936. IEEE, (2019)Resolution Limit of Positioning Error for Range-Free Localization Schemes., , , and . IEEE Syst. J., 14 (2): 2980-2989 (2020)Monitoring User-Intent of Cloud-Based Networked Applications in Cognitive Networks., , , , and . GLOBECOM, page 1-7. IEEE, (2018)Haddle: A Framework for Investigating Data Leakage Attacks in Hadoop., , , , and . GLOBECOM, page 1-6. IEEE, (2015)A New TCP Design for Satellite-HAP Networks., , , , and . CWSN, volume 334 of Communications in Computer and Information Science, page 467-477. Springer, (2012)Deep Spectrum Cartography Using Quantized Measurements., , and . ICASSP, page 1-5. IEEE, (2023)