Author of the publication

Defensive Perception: Estimation and Monitoring of Neural Network Performance Under Deployment.

, , and . Epi UAI, volume 14523 of Lecture Notes in Computer Science, page 44-58. Springer, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Full-duplex vs. half-duplex secret-key generation., and . WIFS, page 1-6. IEEE, (2015)Secret-key generation from wireless channels: Mind the reflections., and . ICC Workshops, page 783-788. IEEE, (2014)Defensive Perception: Estimation and Monitoring of Neural Network Performance under Deployment., , and . CoRR, (2023)Domain is of the Essence: Data Deployment for City-Scale Multi-Camera Vehicle Re-Identification., , , , and . AVSS, page 1-6. IEEE, (2019)State-Space Adaptive Nonlinear Self-Interference Cancellation for Full-Duplex Communication., , and . IEEE Trans. Signal Process., 67 (11): 2810-2825 (2019)On the Capacity Region of Deterministic Strong IC with Multicast and Secure Unicast Messages., , and . WSA, page 1-7. VDE-Verlag / IEEE, (2017)Defensive Perception: Estimation and Monitoring of Neural Network Performance Under Deployment., , and . Epi UAI, volume 14523 of Lecture Notes in Computer Science, page 44-58. Springer, (2024)Practical Secret-Key Generation by Full-Duplex Nodes with Residual Self-Interference., , and . WSA, page 1-5. VDE-Verlag / IEEE, (2016)Adaptive Self-Interference Cancellation for Full Duplex Systems with Auxiliary Receiver., , , and . CommNet, page 1-8. IEEE, (2019)Secret-key generation from wireless channels: Mind the reflections., and . CoRR, (2013)