Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Shadowcast: Stealthy Data Poisoning Attacks Against Vision-Language Models., , , , , , , and . CoRR, (2024)Equal Long-term Benefit Rate: Adapting Static Fairness Notions to Sequential Decision Making., , , , , , and . CoRR, (2023)Weed Detection in Images of Carrot Fields Based on Improved YOLO v4., , , , and . Traitement du Signal, 38 (2): 341-348 (2021)C-Disentanglement: Discovering Causally-Independent Generative Factors under an Inductive Bias of Confounder., , , , , and . CoRR, (2023)Benchmarking the Robustness of Image Watermarks., , , , , , , , , and 1 other author(s). CoRR, (2024)Multi-Task Adversarial Attack., , , and . CoRR, (2020)FREEtree: A Tree-based Approach for High Dimensional Longitudinal Data With Correlated Features., , , , , and . CoRR, (2020)Efficient Coarse Registration of Pairwise TLS Point Clouds Using Ortho Projected Feature Images., , , and . ISPRS Int. J. Geo Inf., 9 (4): 255 (2020)Mementos: A Comprehensive Benchmark for Multimodal Large Language Model Reasoning over Image Sequences., , , , , , , , , and 2 other author(s). CoRR, (2024)Exploring and Exploiting Decision Boundary Dynamics for Adversarial Robustness., , , , and . ICLR, OpenReview.net, (2023)