Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

State of the art on mechanisms for personalization of information., , , and . ICSENT, page 10:1-10:4. ACM, (2018)Fooling End-to-end Speaker Verification by Adversarial Examples., , , and . CoRR, (2018)Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring., , , , and . USENIX Security Symposium, page 1615-1631. USENIX Association, (2018)ConvNets and ImageNet Beyond Accuracy: Understanding Mistakes and Uncovering Biases., and . ECCV (6), volume 11210 of Lecture Notes in Computer Science, page 504-519. Springer, (2018)Fooling End-To-End Speaker Verification With Adversarial Examples., , , and . ICASSP, page 1962-1966. IEEE, (2018)Robust Bloom Filters for Large MultiLabel Classification Tasks., , , and . NIPS, page 1851-1859. (2013)Comparative study of the mechanisms for personalization of information., , , , and . ICIST, page 31:1-31:7. ACM, (2019)ADIOS: Architectures Deep In Output Space., , and . ICML, volume 48 of JMLR Workshop and Conference Proceedings, page 2770-2779. JMLR.org, (2016)Countering Adversarial Images using Input Transformations., , , and . ICLR (Poster), OpenReview.net, (2018)Kronecker Recurrent Units., , and . ICLR (Workshop), OpenReview.net, (2018)