Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dos and Don'ts of Machine Learning in Computer Security., , , , , , , and . CoRR, (2020)Manipulating Feature Visualizations with Gradient Slingshots., , , , , , and . CoRR, (2024)Dos and Don'ts of Machine Learning in Computer Security., , , , , , , and . USENIX Security Symposium, page 3971-3988. USENIX Association, (2022)Convolutional Neural Networks for Movement Prediction in Videos., , and . GCPR, volume 10496 of Lecture Notes in Computer Science, page 215-225. Springer, (2017)Machine Unlearning of Features and Labels., , , and . CoRR, (2021)Machine Unlearning of Features and Labels., , , and . NDSS, The Internet Society, (2023)Lessons Learned on Machine Learning for Computer Security., , , , , , , and . IEEE Secur. Priv., 21 (5): 72-77 (September 2023)Applying Quarter-Vehicle Model Simulation for Road Elevation Measurements Utilizing the Vehicle Level Sensor., , , , , , and . VTC Fall, page 1-6. IEEE, (2020)Explaining Graph Neural Networks for Vulnerability Discovery., , , and . AISec@CCS, page 145-156. ACM, (2021)Detecting Various Road Damage Types in Global Countries Utilizing Faster R-CNN., , , , , , , and . IEEE BigData, page 5563-5571. IEEE, (2020)