From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Brittle Features of Device Authentication., , , , , и . CODASPY, стр. 53-64. ACM, (2021)Explainable Black-Box Attacks Against Model-based Authentication., , , , и . CoRR, (2018)Adversarial Video Captioning., , и . DSN Workshops, стр. 24-27. IEEE, (2019)Beyond Lp Clipping: Equalization based Psychoacoustic Attacks against ASRs., , , , , , , и . ACML, том 157 из Proceedings of Machine Learning Research, стр. 672-688. PMLR, (2021)Disentangling Categorization in Multi-agent Emergent Communication., , и . NAACL-HLT, стр. 4523-4540. Association for Computational Linguistics, (2022)A First Look at Bugs in OpenStack., и . CAN@CoNEXT, стр. 67-72. ACM, (2016)Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems., , , , , , и . SP, стр. 712-729. IEEE, (2021)Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems., , , , , и . NDSS, The Internet Society, (2019)Less is More: Dimension Reduction Finds On-Manifold Adversarial Examples in Hard-Label Attacks., , , , и . SaTML, стр. 254-270. IEEE, (2023)Validation of An Instrument to Know the Use of Smart Devices in Air Conditioners and Their Improvement in Energy Efficiency: Case Study in Ecuador., , , и . Int. J. Online Biomed. Eng., 17 (4): 133-144 (2021)