Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models., and . CoRR, (2018)Classifying Sequences of Extreme Length with Constant Memory Applied to Malware Detection., , , , , and . CoRR, (2020)"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice., , , , , and . SaTML, page 339-364. IEEE, (2023)Machine Learning Model Attribution Challenge., , , , , and . CoRR, (2023)Polar sea ice mapping using SeaWinds data., and . IGARSS, page 71-73. IEEE, (2003)Detecting Homoglyph Attacks with a Siamese Neural Network., , , and . IEEE Symposium on Security and Privacy Workshops, page 22-28. IEEE Computer Society, (2018)Channel-Robust Classifiers., , , and . IEEE Trans. Signal Process., 59 (4): 1421-1434 (2011)Reliable early classification of time series., , , and . ICASSP, page 2073-2076. IEEE, (2012)Subjective evaluations of example-based, total variation, and joint regularization for image processing., , and . Computational Imaging, volume 8296 of SPIE Proceedings, page 82960S. IS&T/SPIE, (2012)Sea ice mapping method for SeaWinds., and . IEEE Trans. Geosci. Remote. Sens., 43 (3): 647-657 (2005)