Abstract: Deep code models are vulnerable to adversarial attacks, making it possible for semantically identical inputs to trigger different responses. Current black-box attack methods typically ...
Abstract: For conducting resource adequacy studies, we synthesize multiple long-term wind power scenarios of distributed wind farms by using the spatio-temporal features: spatial and temporal ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results