Author of the publication

An Adversarial Attack Considering Effectiveness and Concealment on Faster R-CNN.

, , , and . APIT, page 174-180. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bounding box regression with balance for harmonious object detection., and . J. Vis. Commun. Image Represent., (2022)Irreversible synthesis of an ultrastrong two-dimensional polymeric material, , , , , , , , , and 11 other author(s). Nature, 602 (7895): 91--95 (Feb 1, 2022)An Online Data-Driven Method for Microgrid Secondary Voltage and Frequency Control with Ensemble Koopman Modeling., , and . CoRR, (2022)A Discriminative Multi-Channel Facial Shape (MCFS) Representation and Feature Extraction for 3D Human Faces., , , and . Comput. Graph. Forum, 39 (6): 66-81 (2020)LongFNT: Long-Form Speech Recognition with Factorized Neural Transducer., , , , , , and . ICASSP, page 1-5. IEEE, (2023)Grid Intrusion Detection Based on Immune Agent., , , , , and . ICNC (2), volume 4222 of Lecture Notes in Computer Science, page 73-82. Springer, (2006)End-to-End Texture-Aware and Depth-Aware Embedded Advertising for Videos., , and . ICCTA, page 57-61. ACM, (2020)Fingerprinting websites using remote traffic analysis., , and . CCS, page 684-686. ACM, (2010)Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks., , , , and . ICC, page 1-5. IEEE, (2010)Immunity and Mobile Agent Based Grid Intrusion Detection., , , , , and . ICIC (3), volume 4115 of Lecture Notes in Computer Science, page 651-659. Springer, (2006)