30 results on '"Yulong Yang"'
Search Results
2. Output-Only Identification of Lur'e Systems with Hysteretic Feedback Nonlinearities.
3. Robust Consensus Tracking Strategy of Heterogeneous Nonlinear Multi-Agent Systems With Time-Varying Input Delays.
4. Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code.
5. Quantization Aware Attack: Enhancing Transferable Adversarial Attacks by Model Quantization.
6. Output-only identification of self-excited systems using discrete-time Lur'e models with application to a gas-turbine combustor.
7. A Detection and Classification Method of Asphalt Pavement Crack based on Vision Transformer.
8. Reinforcement Learning with Reward Shaping and Hybrid Exploration in Sparse Reward Scenes.
9. A Survey on Adversarial Machine Learning for Code Data: Realistic Threats, Countermeasures, and Interpretations.
10. Security Matrix for Multimodal Agents on Mobile Devices: A Systematic and Proof of Concept Study.
11. Relational Reasoning On Graphs Using Opinion Dynamics.
12. Color Equivariant Network.
13. Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning.
14. Quantization Aware Attack: Enhancing the Transferability of Adversarial Attacks across Target Models with Different Quantization Bitwidths.
15. Hard Adversarial Example Mining for Improving Robust Fairness.
16. CAD Cut-piece Retrieval Method Based on Representation Learning.
17. A Human-as-Sensors Approach to API Documentation Integration and Its Effects on Novice Programmers.
18. Forgetting of Passwords: Ecological Theory and Data.
19. Free-Form Gesture Authentication in the Wild.
20. Elastic pathing: your speed is enough to track you.
21. Disaster mitigation by crowdsourcing hazard documentation.
22. Private Browsing: an Inquiry on Usability and Privacy Protection.
23. User-generated free-form gestures for authentication: security and memorability.
24. A Novel Color Image Watermarking Method Based on Genetic Algorithm and Neural Networks.
25. A Novel Color Image Watermarking Method Based on Genetic Algorithm and Hybrid Neural Networks.
26. Transforming Speed Sequences into Road Rays on the Map with Elastic Pathing.
27. Text Entry Method Affects Password Security.
28. User-Generated Free-Form Gestures for Authentication: Security and Memorability.
29. Elastic Pathing: Your Speed is Enough to Track You.
30. Video: User-generated free-form gestures for authentication: security and memorability.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.