Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically., , , , , , and . CoRR, (2023)Poisoning Web-Scale Training Datasets is Practical., , , , , , , , and . CoRR, (2023)EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models., and . CoRR, (2018)Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection., , , , , and . CoRR, (2020)Machine Learning Model Attribution Challenge., , , , , and . CoRR, (2023)Polar sea ice mapping using SeaWinds data., and . IGARSS, page 71-73. IEEE, (2003)Channel-Robust Classifiers., , , and . IEEE Trans. Signal Process., 59 (4): 1421-1434 (2011)Detecting Homoglyph Attacks with a Siamese Neural Network., , , and . IEEE Symposium on Security and Privacy Workshops, page 22-28. IEEE Computer Society, (2018)Subjective evaluations of example-based, total variation, and joint regularization for image processing., , and . Computational Imaging, volume 8296 of SPIE Proceedings, page 82960S. IS&T/SPIE, (2012)Sea ice mapping method for SeaWinds., and . IEEE Trans. Geosci. Remote. Sens., 43 (3): 647-657 (2005)