Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scaled-Time-Attention Robust Edge Network., , , , , , , , and . CoRR, (2021)Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples., , and . Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML, volume 11329 of Lecture Notes in Computer Science, page 16-29. Springer, (2018)Universal Lipschitz Approximation in Bounded Depth Neural Networks., , and . CoRR, (2019)Robot Design With Neural Networks, MILP Solvers and Active Learning., , , , , , , , and . CoRR, (2020)Pareto GAN: Extending the Representational Power of GANs to Heavy-Tailed Distributions., , , , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 4523-4532. PMLR, (2021)TOP: Backdoor Detection in Neural Networks via Transferability of Perturbation., and . CoRR, (2021)ReFace: Real-time Adversarial Attacks on Face Recognition Systems., , , , , , , and . CoRR, (2022)ReFace: Adversarial Transformation Networks for Real-time Attacks on Face Recognition Systems., , , , and . DSN, page 302-312. IEEE, (2023)Towards the Development of Robust Deep Neural Networks in Adversarial Settings., , , and . MILCOM, page 419-424. IEEE, (2018)