Author of the publication

Enhancing the transferability of adversarial attacks with diversified input strategies.

, , , , , , and . J. Intell. Fuzzy Syst., 46 (4): 10359-10373 (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基于非合作博弈攻击预测的防御策略选取方法 (Defense Strategies Selection Method Based on Non-cooperative Game Attack Forecast)., , and . 计算机科学, 43 (1): 195-201 (2016)Active Defense Strategy Selection Method Based on Two-Way Signaling Game., , , , and . Secur. Commun. Networks, (2019)Recommendations Based on Listwise Learning-to-Rank by Incorporating Social Information., , , and . KSII Trans. Internet Inf. Syst., 12 (1): 109-134 (2018)Cybersecurity Threat Assessment Integrating Qualitative Differential and Evolutionary Games., , , , , and . IEEE Trans. Netw. Serv. Manag., 19 (3): 3425-3437 (2022)Improving the Transferability of Adversarial Examples with the Adam Optimizer., , , and . CoRR, (2020)Random Transformation of Image Brightness for Adversarial Attack., , , and . CoRR, (2021)An Efficient Fault Detection and Exclusion Method for Ephemeris Monitoring., , and . Remote. Sens., 15 (13): 3259 (July 2023)Moving Target Defense Decision-Making Method: A Dynamic Markov Differential Game Model., , , and . MTD@CCS, page 21-29. ACM, (2020)A Novel Soft-Rigid Hybrid Actuator with Vertebrae., , , and . RCAR, page 417-422. IEEE, (2023)Design and Implementation of a Multifunctional Screw Disassembly Workstation., , , , , , and . ICIRA (8), volume 14274 of Lecture Notes in Computer Science, page 506-519. Springer, (2023)