Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward an analytic framework for the electrical power grid., , and . e-Energy, page 9. ACM, (2012)Adversarial Classification on Social Networks., , and . AAMAS, page 211-219. International Foundation for Autonomous Agents and Multiagent Systems Richland, SC, USA / ACM, (2018)Adversarial Regression with Multiple Learners., , , and . ICML, volume 80 of Proceedings of Machine Learning Research, page 4953-4961. PMLR, (2018)Optimal Edge Weight Perturbations to Attack Shortest Paths., , , , , and . CoRR, (2021)Training-Time Attacks against k-Nearest Neighbors., , and . CoRR, (2022)Approximate Data Deletion in Generative Models., and . CoRR, (2022)PATHATTACK: Attacking Shortest Paths in Complex Networks., , , , , and . ECML/PKDD (2), volume 12976 of Lecture Notes in Computer Science, page 532-547. Springer, (2021)Hard to Forget: Poisoning Attacks on Certified Machine Unlearning., , and . CoRR, (2021)Training Set Camouflage., , , , , and . GameSec, volume 11199 of Lecture Notes in Computer Science, page 59-79. Springer, (2018)POTION : Optimizing Graph Structure for Targeted Diffusion., , , , and . SDM, page 154-162. SIAM, (2021)