![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 71 matches
- 2024
- Chengwu Qian, Jiangbo Qian, Chong Wang, Xulun Ye, Caiming Zhong:
A Vision Enhancement and Feature Fusion Multiscale Detection Network. Neural Process. Lett. 56(1): 19 (2024) - Ke Mu, Cheng Tang
, Luigi Tosi
, Yanfang Li
, Xiangyang Zheng, Sandra Donnici
, Jixiang Sun, Jun Liu, Xuelu Gao
:
Coastline Monitoring and Prediction Based on Long-Term Remote Sensing Data - A Case Study of the Eastern Coast of Laizhou Bay, China. Remote. Sens. 16(1): 185 (2024) - Xuelun Shen, Zhipeng Cai, Wei Yin, Matthias Müller, Zijun Li, Kaixuan Wang, Xiaozhi Chen, Cheng Wang:
GIM: Learning Generalizable Image Matcher From Internet Videos. CoRR abs/2402.11095 (2024) - Zixin Zhu, Xuelu Feng, Dongdong Chen, Junsong Yuan, Chunming Qiao, Gang Hua:
Exploring Pre-trained Text-to-Video Diffusion Models for Referring Video Object Segmentation. CoRR abs/2403.12042 (2024) - 2023
- Meng Xue
, Kuang Peng
, Xueluan Gong
, Qian Zhang
, Yanjiao Chen
, Routing Li
:
Echo: Reverberation-based Fast Black-Box Adversarial Attacks on Intelligent Audio Systems. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(3): 137:1-137:24 (2023) - Meng Xue
, Yanjiao Chen, Xueluan Gong
, Houze Cao, Jian Zhang, Qian Zhang
:
Meta-Learning for Human-Centered Wireless Sensing: Architecture, Applications, and Challenges. IEEE Netw. 37(1): 88-94 (2023) - Zengliang Zang, Xulun Bao
, Yi Li, Youming Qu, Dan Niu, Ning Liu, Xisong Chen:
A Modified RNN-Based Deep Learning Method for Prediction of Atmospheric Visibility. Remote. Sens. 15(3): 553 (2023) - Yanjiao Chen
, Zhicong Zheng
, Xueluan Gong
:
MARNet: Backdoor Attacks Against Cooperative Multi-Agent Reinforcement Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 4188-4198 (2023) - Xueluan Gong
, Ziyao Wang, Yanjiao Chen
, Meng Xue
, Qian Wang
, Chao Shen
:
Kaleidoscope: Physical Backdoor Attacks Against Deep Neural Networks With RGB Filters. IEEE Trans. Dependable Secur. Comput. 20(6): 4993-5004 (2023) - Xueluan Gong
, Ziyao Wang, Shuaike Li
, Yanjiao Chen
, Qian Wang
:
A GAN-Based Defense Framework Against Model Inversion Attacks. IEEE Trans. Inf. Forensics Secur. 18: 4475-4487 (2023) - Yanjiao Chen
, Xiaotian Zhu, Xueluan Gong
, Xinjing Yi, Shuyang Li:
Data Poisoning Attacks in Internet-of-Vehicle Networks: Taxonomy, State-of-The-Art, and Future Directions. IEEE Trans. Ind. Informatics 19(1): 20-28 (2023) - Xuelun Shen, Qian Hu, Xin Li
, Cheng Wang
:
A Detector-Oblivious Multi-Arm Network for Keypoint Matching. IEEE Trans. Image Process. 32: 2776-2785 (2023) - Xueluan Gong
, Yanjiao Chen
, Wenbin Yang
, Huayang Huang
, Qian Wang
:
B3: Backdoor Attacks against Black-box Machine Learning Models. ACM Trans. Priv. Secur. 26(4): 43:1-43:24 (2023) - Xueluan Gong
, Yanjiao Chen, Qian Wang, Weihan Kong:
Backdoor Attacks and Defenses in Federated Learning: State-of-the-Art, Taxonomy, and Future Directions. IEEE Wirel. Commun. 30(2): 114-121 (2023) - Zhengfeng Lai, Noranart Vesdapunt, Ning Zhou, Jun Wu, Cong Phuoc Huynh, Xuelu Li, Kah Kuen Fu, Chen-Nee Chuah:
PADCLIP: Pseudo-labeling with Adaptive Debiasing in CLIP for Unsupervised Domain Adaptation. ICCV 2023: 16109-16119 - Zhu Yi, Yao Junyou, Huang Hui, Boqing Liu, Jianfei Feng, Chen Xueluan:
Research on Anti-interference System of Electronic Communication Equipment under Computer Big Data. ICISCAE 2023: 1119-1123 - Qian Hu, Xuelun Shen, Zijun Li, Weiquan Liu, Cheng Wang:
Feature Matching in the Changed Environments for Visual Localization. PRCV (11) 2023: 171-183 - Yanjiao Chen, Rui Guan, Xueluan Gong, Jianshuo Dong, Meng Xue
:
D-DAE: Defense-Penetrating Model Extraction Attacks. SP 2023: 382-399 - Xueluan Gong, Yanjiao Chen, Wang Yang, Qian Wang, Yuzhe Gu, Huayang Huang, Chao Shen:
Redeem Myself: Purifying Backdoors in Deep Learning Models using Self Attention Distillation. SP 2023: 755-772 - Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. USENIX Security Symposium 2023: 5163-5180 - Xueluan Gong
, Ziyao Wang
, Yanjiao Chen
, Qian Wang
, Cong Wang
, Chao Shen
:
NetGuard: Protecting Commercial Web APIs from Model Inversion Attacks using GAN-generated Fake Samples. WWW 2023: 2045-2053 - Jiangyi Deng, Yanjiao Chen, Yinan Zhong, Qianhao Miao, Xueluan Gong, Wenyuan Xu:
Catch You and I Can: Revealing Source Voiceprint Against Voice Conversion. CoRR abs/2302.12434 (2023) - Zixin Zhu, Xuelu Feng, Dongdong Chen, Jianmin Bao, Le Wang, Yinpeng Chen, Lu Yuan, Gang Hua:
Designing a Better Asymmetric VQGAN for StableDiffusion. CoRR abs/2306.04632 (2023) - 2022
- Xueluan Gong
, Yanjiao Chen, Qian Wang, Meng Wang, Shuyang Li:
Private Data Inference Attacks against Cloud: Model, Technologies, and Research Directions. IEEE Commun. Mag. 60(9): 46-52 (2022) - Meng Xue
, Yanjiao Chen, Xueluan Gong
, Jian Zhang, Chunkai Fan:
Wet-Ra: Monitoring Diapers Wetness with Wireless Signals. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 6(2): 84:1-84:26 (2022) - Yu Zhang
, Xuelu Wu, Hong Peng, Caijun Zhong, Xiaoming Chen:
Beamforming and fronthaul compression design for intelligent reflecting surface aided cloud radio access networks. Frontiers Inf. Technol. Electron. Eng. 23(1): 31-46 (2022) - Xueluan Gong
, Yanjiao Chen, Huayang Huang, Yuqing Liao, Shuai Wang, Qian Wang:
Coordinated Backdoor Attacks against Federated Learning with Model-Dependent Triggers. IEEE Netw. 36(1): 84-90 (2022) - Xuelun Shen, Cheng Wang, Xin Li, Yifan Peng, Zijian He, Chenglu Wen, Ming Cheng:
Learning scale awareness in keypoint extraction and description. Pattern Recognit. 121: 108221 (2022) - Yanfei Su
, Weiquan Liu, Zhimin Yuan, Ming Cheng, Zhihong Zhang, Xuelun Shen, Cheng Wang:
DLA-Net: Learning dual local attention features for semantic segmentation of large-scale building facade point clouds. Pattern Recognit. 123: 108372 (2022) - Xulun Liu, Shiping Ma, Linyuan He, Chen Wang, Zhe Chen:
Hybrid Network Model: TransConvNet for Oriented Object Detection in Remote Sensing Images. Remote. Sens. 14(9): 2090 (2022)
skipping 41 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-17 15:00 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint