Characterizing Attacks on Deep Reinforcement Learning. | 0 | 0.34 | 2022 |
Transformer-Based Language-Person Search With Multiple Region Slicing. | 0 | 0.34 | 2022 |
Iterative Shrinking for Referring Expression Grounding Using Deep Reinforcement Learning | 0 | 0.34 | 2021 |
Progressive sample mining and representation learning for one-shot person re-identification | 2 | 0.42 | 2021 |
Discriminative Triad Matching and Reconstruction for Weakly Referring Expression Grounding | 0 | 0.34 | 2021 |
An Improved Random Walk Algorithm for Resource Scheduling in Cloud Datacenter. | 0 | 0.34 | 2021 |
Reliability Does Matter: An End-To-End Weakly Supervised Semantic Segmentation Approach | 0 | 0.34 | 2020 |
Denoised Smoothing: A Provable Defense for Pretrained Classifiers | 0 | 0.34 | 2020 |
Fast Template Matching and Update for Video Object Tracking and Segmentation | 0 | 0.34 | 2020 |
Rethinking the Value of Network Pruning. | 0 | 0.34 | 2019 |
Rethinking the Value of Network Pruning. | 33 | 0.76 | 2018 |
Data Poisoning Attack against Unsupervised Node Embedding Methods. | 2 | 0.36 | 2018 |
Analysis on ghost image contrast using linearly polarized light | 0 | 0.34 | 2014 |
Monitoring BPEL-Based Web Service Composition Using AOP | 14 | 0.93 | 2009 |
A PSC-Based Approach to Monitor the Timed Properties in Web Service Compositions | 2 | 0.40 | 2008 |