Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stochastic Discriminant Analysis., , and . IJCNN, page 1-8. IEEE, (2015)Stochastic discriminant analysis for linear supervised dimension reduction., , and . Neurocomputing, (2018)PRADA: Protecting Against DNN Model Stealing Attacks., , , and . EuroS&P, page 512-527. IEEE, (2019)Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks., , , , , and . NDSS, The Internet Society, (2016)Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews., , , and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 132-151. Springer, (2018)Making Targeted Black-box Evasion Attacks Effective and Efficient., , and . AISec@CCS, page 83-94. ACM, (2019)All You Need is: Evading Hate Speech Detection., , , , and . AISec@CCS, page 2-12. ACM, (2018)Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories., , , and . EuroS&P, page 199-213. IEEE, (2018)A little goes a long way: Improving toxic language classification despite data scarcity., , , and . EMNLP (Findings), volume EMNLP 2020 of Findings of ACL, page 2991-3009. Association for Computational Linguistics, (2020)All You Need is "Love": Evading Hate-speech Detection., , , , and . CoRR, (2018)