Author of the publication

Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data.

, , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

XSS-FP: Browser Fingerprinting using HTML Parser Quirks, , , , , and . CoRR, (2012)Artificial Mutation inspired Hyper-heuristic for Runtime Usage of Multi-objective Algorithms., , , and . CoRR, (2014)System Testing of Product Lines: From Requirements to Test Cases., , and . Software Product Lines, Springer, (2006)Mining Fix Patterns for FindBugs Violations., , , , and . CoRR, (2017)What You See is What it Means! Semantic Representation Learning of Code based on Visualization and Transfer Learning., , , , and . CoRR, (2020)Tools for Conviviality in Multi-Context Systems., , and . FLAP, 1 (1): 95-114 (2014)Requirements by Contracts allow Automated System Testing, , , and . ISSRE '03: Proceedings of the 14th International Symposium on Software Reliability Engineering, page 85. Washington, DC, USA, IEEE Computer Society, (2003)Under Pressure Benchmark for DDBMS Availability., , , , , and . J. Inf. Data Manag., 4 (3): 266-278 (2013)Roundtable: Research Opportunities and Challenges for Emerging Software Systems., , , , and . J. Comput. Sci. Technol., 30 (5): 935-941 (2015)System Test Synthesis from UML Models of Distributed Software, , , , , and . FORTE, page 97-113. (2002)MR: Mittels UMLAUT wird die UML-Spezifikation in ein IOLTS überführt und durch das Testsynthesis-Tool TGV werden Testfälle abgeleitet. Auf diesem Ansatz baut auch der Ansatz von Nebut im SPL-Umfeld Nebut2002Nebut2003Nebut2006..