Author of the publication

An Adversarial Attack Considering Effectiveness and Concealment on Faster R-CNN.

, , , and . APIT, page 174-180. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tikhonov sum approach for joint carrier phase estimation and decoding in frequency-hopping communications., , , and . WCSP, page 1-5. IEEE, (2015)Detecting Promotion Campaigns in Query Auto Completion., , , , , , and . CIKM, page 125-134. ACM, (2016)Dynamic allocation of security resources for protecting public events., , and . AAMAS, page 1473-1474. IFAAMAS/ACM, (2014)Optimally Protecting Elections., , , and . IJCAI, page 538-545. IJCAI/AAAI Press, (2016)Computing Optimal Mixed Strategies for Security Games with Dynamic Payoffs., , , , and . IJCAI, page 681-688. AAAI Press, (2015)Joint User Pairing and Resource Allocation in Air-to-Ground Communication-Caching-Charging Integrated Network Based on NOMA., , , , , and . IEEE Trans. Veh. Technol., 72 (12): 15819-15828 (December 2023)An AR-assisted Deep Reinforcement Learning-based approach towards mutual-cognitive safe human-robot interaction., , , , and . Robotics Comput. Integr. Manuf., (2023)Deep Learning-Aided OCR Techniques for Chinese Uppercase Characters in the Application of Internet of Things., , , , , and . IEEE Access, (2019)Resource Allocation for UAV-Assisted MIMO-NOMA Wireless Caching Networks., , , and . QRS Companion, page 1006-1010. IEEE, (2021)Research on Practice and Teaching About Digital Media., , , , and . HCI (18), volume 12779 of Lecture Notes in Computer Science, page 523-532. Springer, (2021)