Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NeuroMask: Explaining Predictions of Deep Neural Networks through Mask Learning., , , and . SMARTCOMP, page 81-86. IEEE, (2019)CAAD 2018: Generating Transferable Adversarial Examples., , and . CoRR, (2018)Mondegreen: A Post-Processing Solution to Speech Recognition Error Correction for Voice Search Queries., , , , , , , , , and 11 other author(s). KDD, page 3569-3575. ACM, (2021)Generating Natural Language Adversarial Examples., , , , , and . EMNLP, page 2890-2896. Association for Computational Linguistics, (2018)CryptoImg: Privacy preserving processing over encrypted images., , , and . CNS, page 570-575. IEEE, (2016)Deep Residual Neural Networks for Audio Spoofing Detection., , and . INTERSPEECH, page 1078-1082. ISCA, (2019)DEMO Classroom7: Please, Make Sure Your Phones Are Switched On!, , and . MobiQuitous, volume 104 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 243-247. Springer, (2011)Distributed opportunistic sensing and fusion for traffic congestion detection., , , , , , , , , and . SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI, page 1-6. IEEE, (2017)Demonstrating CrowdInside: A system for the automatic construction of indoor floor-plans., and . PerCom Workshops, page 321-323. IEEE Computer Society, (2013)SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT., , , , and . IEEE Symposium on Security and Privacy Workshops, page 163-168. IEEE, (2019)