From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Enhancing Targeted Transferability Via Suppressing High-Confidence Labels., , , и . ICIP, стр. 3309-3313. IEEE, (2023)Boosting Transferability of Adversarial Example via an Enhanced Euler's Method., , , , и . ICASSP, стр. 1-5. IEEE, (2023)An Enhanced Transferable Adversarial Attack Against Object Detection., , , и . IJCNN, стр. 1-7. IEEE, (2023)Towards Undetectable Adversarial Examples: A Steganographic Perspective., , , , и . ICONIP (4), том 14450 из Lecture Notes in Computer Science, стр. 172-183. Springer, (2023)Robust median filtering forensics based on the autoregressive model of median filtered residual., , , и . APSIPA, стр. 1-9. IEEE, (2012)Gradient-Based Adversarial Image Forensics., , , , , и . ICONIP (2), том 12533 из Lecture Notes in Computer Science, стр. 417-428. Springer, (2020)An Enhanced Neuron Attribution-Based Attack Via Pixel Dropping., , , , и . ICIP, стр. 3439-3443. IEEE, (2023)Deep Residual Learning Using Data Augmentation for Median Filtering Forensics of Digital Images., , , , и . IEEE Access, (2019)Towards infrared human pose estimation via Transformer., , , и . IJCNN, стр. 1-8. IEEE, (2023)Countering the Anti-detection Adversarial Attacks., , , , , и . ICONIP (4), том 1791 из Communications in Computer and Information Science, стр. 489-500. Springer, (2022)