From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking., , , , , и . CoRR, (2019)Energy efficiency and optimal threshold for FFR schemes in OFDMA cellular networks., , , , , и . ICSPCS, стр. 1-7. IEEE, (2016)Throttling Outgoing SPAM for Webmail Services., , и . CEAS, (2005)Citrus Tree Segmentation from UAV Images Based on Monocular Machine Vision in a Natural Orchard Environment., , , , , , , , , и . Sensors, 19 (24): 5558 (2019)Robust System Instance Clustering for Large-Scale Web Services., , , , , , , , , и 4 other автор(ы). WWW, стр. 1785-1796. ACM, (2022)Building Towards "Invisible Cloak": Robust Physical Adversarial Attack on YOLO Object Detector., , , , , , , и . UEMCON, стр. 368-374. IEEE, (2018)Scaling Efficient Masked Autoencoder Learning on Large Remote Sensing Dataset., , , , , , , , и . CoRR, (2024)Multi-scale surface defect detection method for bottled products based on variable receptive fields and Gather-Distribute feature fusion mechanism., , , , , , и . Comput. Electr. Eng., (2024)Failure Diagnosis in Microservice Systems: A Comprehensive Survey and Analysis., , , , , , , , и . CoRR, (2024)Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction., , , , и . CoRR, (2019)