From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Convolutional Neural Networks for Page Segmentation of Historical Document Images, и . (2017)cite arxiv:1704.01474.Collaborative filtering and deep learning based recommendation system for cold start items., , , , и . Expert Syst. Appl., (2017)Course Control of Unmanned Sailboat Based on BAS-PID Algorithm., , , , и . ICSSE, стр. 1-5. IEEE, (2020)Seeing isn't Believing: Towards More Robust Adversarial Attack Against Real World Object Detectors., , , , , и . ACM Conference on Computer and Communications Security, стр. 1989-2004. ACM, (2019)Cracking App Isolation on Apple: Unauthorized Cross-App Resource Access on MAC OS~X and iOS., , , , , , , и . ACM Conference on Computer and Communications Security, стр. 31-43. ACM, (2015)An improved Multi-hop Routing Protocol for Large-Scale Wireless Sensor Network Based on Merging Adjacent Clusters., и . J. Softw., 8 (8): 2080-2086 (2013)Planning with Task-Oriented Knowledge Acquisition for a Service Robot., , и . IJCAI, стр. 812-818. IJCAI/AAAI Press, (2016)HAFLO: GPU-Based Acceleration for Federated Logistic Regression., , , , и . CoRR, (2021)Safer-Instruct: Aligning Language Models with Automated Preference Data., , и . CoRR, (2023)Model Stealing Attack against Multi-Exit Networks., , , , , и . CoRR, (2023)