BibTeX records: Cuong Phuc Ngo

download as .bib file

@article{DBLP:journals/ijon/PaknezhadNWCYWL22,
  author       = {Mahsa Paknezhad and
                  Cuong Phuc Ngo and
                  Amadeus Aristo Winarto and
                  Alistair Cheong and
                  Beh Chuen Yang and
                  Jiayang Wu and
                  Hwee Kuan Lee},
  title        = {Explaining adversarial vulnerability with a data sparsity hypothesis},
  journal      = {Neurocomputing},
  volume       = {495},
  pages        = {178--193},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.neucom.2022.01.062},
  doi          = {10.1016/J.NEUCOM.2022.01.062},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/PaknezhadNWCYWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-00778,
  author       = {Mahsa Paknezhad and
                  Cuong Phuc Ngo and
                  Amadeus Aristo Winarto and
                  Alistair Cheong and
                  Beh Chuen Yang and
                  Jiayang Wu and
                  Hwee Kuan Lee},
  title        = {Explaining Adversarial Vulnerability with a Data Sparsity Hypothesis},
  journal      = {CoRR},
  volume       = {abs/2103.00778},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.00778},
  eprinttype    = {arXiv},
  eprint       = {2103.00778},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-00778.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictai/NgoWKPAL19,
  author       = {Cuong Phuc Ngo and
                  Amadeus Aristo Winarto and
                  Connie Khor Li Kou and
                  Sojeong Park and
                  Farhan Akram and
                  Hwee Kuan Lee},
  title        = {Fence {GAN:} Towards Better Anomaly Detection},
  booktitle    = {31st {IEEE} International Conference on Tools with Artificial Intelligence,
                  {ICTAI} 2019, Portland, OR, USA, November 4-6, 2019},
  pages        = {141--148},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICTAI.2019.00028},
  doi          = {10.1109/ICTAI.2019.00028},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ictai/NgoWKPAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-01209,
  author       = {Cuong Phuc Ngo and
                  Amadeus Aristo Winarto and
                  Connie Khor Li Kou and
                  Sojeong Park and
                  Farhan Akram and
                  Hwee Kuan Lee},
  title        = {Fence {GAN:} Towards Better Anomaly Detection},
  journal      = {CoRR},
  volume       = {abs/1904.01209},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.01209},
  eprinttype    = {arXiv},
  eprint       = {1904.01209},
  timestamp    = {Wed, 24 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-01209.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}