Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Mining-Based Analysis of Chinese Medicinal Herb Formulae in Metabolic associated fatty liver Disease Treatment., , , , , , and . ISAIMS, page 254-258. ACM, (2022)A Le Cam Type Bound for Adversarial Learning and Applications., , and . ISIT, page 1164-1169. IEEE, (2021)Towards Feature Space Adversarial Attack., , , , and . CoRR, (2020)MIRROR: Model Inversion for Deep LearningNetwork with High Fidelity., , , , , , , and . NDSS, The Internet Society, (2022)ImU: Physical Impersonating Attack for Face Recognition System with Natural Style Changes., , , , , , , , , and 1 other author(s). SP, page 899-916. IEEE, (2023)The Potential Mechanisms of Acupuncture in Cardiac Arrhythmias by Bioinformatics., , , , and . ISAIMS, page 84-89. ACM, (2023)Exploring the mechanism of action of acupuncture in the treatment of sciatica based on bioinformatics., , , , and . ISAIMS, page 1152-1156. ACM, (2023)Differences In Acupuncture Treatment Of Dysmenorrhea Between China And Europe., , and . BIBE, page 39:1-39:4. ACM, (2021)Analysis of curative effect and point selection of different acupuncture treatments for sciatica based on data mining technology., , , , , and . ISAIMS, page 279-285. ACM, (2022)Bounded Adversarial Attack on Deep Content Features., , and . CVPR, page 15182-15191. IEEE, (2022)