Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deep Feature Space Trojan Attack of Neural Networks by Controlled Detoxification., , , and . AAAI, page 1148-1156. AAAI Press, (2021)Hard-label Black-box Universal Adversarial Patch Attack., , , , and . USENIX Security Symposium, page 697-714. USENIX Association, (2023)DETGAN: GAN for Arbitrary-oriented Object Detection in Remote Sensing Images., , , and . CACML, page 337-341. IEEE, (2022)Permeability Model for Porous Transducer With Glass Spheres Packing., , and . IEEE Access, (2019)Design, modeling and control of a novel amphibious robot with dual-swing-legs propulsion mechanism., , , , and . IROS, page 559-566. IEEE, (2015)Towards Feature Space Adversarial Attack., , , , and . CoRR, (2020)Optimization of single and double supply and distribution networks based on ant colony algorithm and genetic algorithm., , , and . CNIOT, page 765-769. ACM, (2023)Genetic algorithm and dynamic planning based airline shipment optimization system., , and . CNIOT, page 631-635. ACM, (2023)Detecting Backdoors in Pre-trained Encoders., , , , , , , , and . CVPR, page 16352-16362. IEEE, (2023)Contrastive Demonstration Tuning for Pre-trained Language Models., , , , , and . EMNLP (Findings), page 799-811. Association for Computational Linguistics, (2022)