Author of the publication

Infinity-Norm Support Vector Machines Against Adversarial Label Contamination.

, , , , and . ITASEC, volume 1816 of CEUR Workshop Proceedings, page 106-115. CEUR-WS.org, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poisoning Behavioral Malware Clustering., , , , , , and . CoRR, (2018)A Classification-Selection Approach for Self Updating of Face Verification Systems Under Stringent Storage and Computational Requirements., , , and . ICIAP (2), volume 9280 of Lecture Notes in Computer Science, page 540-550. Springer, (2015)Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection., , , , , and . ACM Trans. Priv. Secur., 24 (4): 27:1-27:31 (2021)Critical analysis of adaptive biometric systems., , and . IET Biom., 1 (4): 179-187 (2012)Bayesian relevance feedback for content-based image retrieval., and . Pattern Recognit., 37 (7): 1499-1508 (2004)Analysis of error-reject trade-off in linearly combined multiple classifiers., and . Pattern Recognit., 37 (6): 1245-1265 (2004)Design of Effective Multiple Classifier Systems by Clustering of Classifiers, , , and . IEEE, (2000)Multiple Classifier Systems.. Encyclopedia of Biometrics, Springer US, (2009)Image Recognition by Integration of Connectionist and Symbolic Approaches., , and . IJPRAI, 9 (3): 485-515 (1995)ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches., , , , , , and . CoRR, (2022)