Author of the publication

Adversarial attack and defense technologies in natural language processing: A survey.

, , , and . Neurocomputing, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A clone of social networks to decentralized bootstrapping P2P networks., , , and . IWQoS, page 1-2. IEEE, (2010)Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement., , , and . Comput. Stand. Interfaces, (2018)A Survey on Fast-flux Attacks.. Inf. Secur. J. A Glob. Perspect., 24 (4-6): 79-97 (2015)Fast-flux attack network identification based on agent lifespan., , and . WCNIS, page 658-662. IEEE, (2010)An Efficient Differential Privacy Logistic Classification Mechanism., , , and . IEEE Internet Things J., 6 (6): 10620-10626 (2019)On Learning Mechanical Laws of Motion From Video Using Neural Networks., , , , , and . IEEE Access, (2023)Multi-core implementation of decomposition-based packet classification algorithms., , and . J. Supercomput., 69 (1): 34-42 (2014)ALTO: Alternating Latent Topologies for Implicit 3D Reconstruction., , , , , , , and . CoRR, (2022)A new hierarchical temporal memory based on recurrent learning unit., , , , , and . J. Exp. Theor. Artif. Intell., 35 (5): 665-678 (July 2023)The Expression of Multi-sensory User Experience on Interactive Packaging Design-Emotional Design of Children's Food., , and . HCI (48), volume 1654 of Communications in Computer and Information Science, page 699-703. Springer, (2022)