50 results on '"Shan-Hung Wu"'
Search Results
2. Adversarial Pixel Masking: A Defense against Physical Attacks for Pre-trained Object Detectors.
3. Attacking and Defending Behind A Psychoacoustics-Based Captcha.
4. Don't Look Back, Look into the Future: Prescient Data Partitioning and Migration for Deterministic Database Systems.
5. Mandarin Singing Voice Synthesis with a Phonology-based Duration Model.
6. Neural Tangent Generalization Attacks.
7. MPop600: A Mandarin Popular Song Database with Aligned Audio, Lyrics, and Musical Scores for Singing Voice Synthesis.
8. Adversarial Robustness via Runtime Masking and Cleansing.
9. CNN2: Viewpoint Generalization via a Binocular Vision.
10. Distributed, Egocentric Representations of Graphs for Detecting Critical Structures.
11. On the Trade-off between Adversarial and Backdoor Robustness.
12. Region-Semantics Preserving Image Synthesis.
13. Learning User Perceived Clusters with Feature-Level Supervision.
14. T-Part: Partitioning of Transactions for Forward-Pushing in Deterministic Database Systems.
15. Non-Linear Cross-Domain Collaborative Filtering via Hyper-Structure Transfer.
16. Rendezvous for heterogeneous spectrum-agile devices.
17. Learning the Consistent Behavior of Common Users for Target Node Prediction across Social Networks.
18. On bridging the gap between homogeneous and heterogeneous rendezvous schemes for cognitive radios.
19. Unilateral Wakeup for Mobile Ad Hoc Networks.
20. Minimizing Broadcast Delay in Location-Based Channel Access Protocols.
21. AAA: Asynchronous, Adaptive, and Asymmetric Power Management for Mobile Ad Hoc Networks.
22. Asymmetric support vector machines: low false-positive learning under the user tolerance.
23. Fully Adaptive Power Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System.
24. DIKNN: An Itinerary-based KNN Query Processing Algorithm for Mobile Sensor Networks.
25. Adversarial Pixel Masking
26. Detecting in-situ identity fraud on social network services: a case study on facebook.
27. Attacking and Defending Behind A Psychoacoustics-Based Captcha
28. MgCrab
29. Detecting In Situ Identity Fraud on Social Network Services: A Case Study With Facebook
30. On Low-Overhead and Stable Data Transmission between Channel-Hopping Cognitive Radios
31. An Asymmetric Quorum-based Power Saving Protocol for Clustered Ad Hoc Networks.
32. Region-Semantics Preserving Image Synthesis
33. Unilateral Wakeup for Mobile Ad Hoc Networks with Group Mobility
34. On Generalizable Low False-Positive Learning Using Asymmetric Support Vector Machines
35. T-Part
36. Collaborative Wakeup in Clustered Ad Hoc Networks
37. An Asymmetric and Asynchronous Energy Conservation Protocol for Vehicular Networks
38. Implementation and performance evaluation for a ubiquitous and unified multimedia messaging platform
39. Detecting in-situ identity fraud on social network services
40. Rendezvous for heterogeneous spectrum-agile devices
41. On bridging the gap between homogeneous and heterogeneous rendezvous schemes for cognitive radios
42. Unilateral Wakeup for Mobile Ad Hoc Networks
43. Asymmetric support vector machines
44. Fully Adaptive Power Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System
45. Adaptive k-Coverage Contour Evaluation and Deployment in Wireless Sensor Networks.
46. An Asymmetric and Asynchronous Energy Conservation Protocol for Vehicular Networks.
47. Implementation and performance evaluation for a ubiquitous and unified multimedia messaging platform.
48. Toward the Optimal. Itinerary-Based KNN Query Processing in Mobile Sensor Networks.
49. Proceedings of the 21st International Conference on Extending Database Technology, EDBT 2018, Vienna, Austria, March 26-29, 2018.
50. User-guided Repairing of Inconsistent Knowledge Bases
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.