Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Cyber-Physical Systems: Physics-Enhanced Adversarial Learning for Autonomous Platoons., , , and . ECML/PKDD (3), volume 13715 of Lecture Notes in Computer Science, page 269-285. Springer, (2022)A Learning-Based Approach to Reactive Security., , , , , and . IEEE Trans. Dependable Secur. Comput., 9 (4): 482-493 (2012)It's Simplex! Disaggregating Measures to Improve Certified Robustness., , , , and . CoRR, (2023)Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking., , , , , , , , and . CoRR, (2019)A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy., , , and . IEEE Trans. Inf. Theory, 68 (1): 538-548 (2022)Predicting dynamic spectrum allocation: a review covering simulation, modelling, and prediction., , , , and . Artif. Intell. Rev., 56 (10): 10921-10959 (October 2023)No DBA? No regret! Multi-armed bandits for index tuning of analytical and HTAP workloads with provable guarantees., , , and . CoRR, (2021)Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks., and . CoRR, (2017)Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge, , and . CoRR, (2011)Evading Anomaly Detection through Variance Injection Attacks on PCA., , , , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 394-395. Springer, (2008)