Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Borders and gateways: measuring and analyzing national as chokepoints., , , , and . COMPASS, page 184-194. ACM, (2019)Supervised learning of sparse context reconstruction coefficients for data representation and classification., , , , and . Neural Comput. Appl., 28 (1): 135-143 (2017)Representing Data by Sparse Combination of Contextual Data Points for Classification., , , , and . ISNN, volume 9377 of Lecture Notes in Computer Science, page 373-381. Springer, (2015)Defending Against Neural Network Model Stealing Attacks Using Deceptive Perturbations., , , and . IEEE Symposium on Security and Privacy Workshops, page 43-49. IEEE, (2019)Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering., , , , , , , and . SafeAI@AAAI, volume 2301 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)AdvIT: Adversarial Frames Identifier Based on Temporal Consistency in Videos., , , , , , , , and . ICCV, page 3967-3976. IEEE, (2019)Enhancing privacy in participatory sensing applications with multidimensional data., , , , and . PerCom, page 144-152. IEEE Computer Society, (2012)Hype and Heavy Tails: A Closer Look at Data Breaches., , and . WEIS, (2015)Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls., , , and . ACSAC, page 391-400. ACM, (2015)Assessing the Use of Optical Satellite Images to Detect Volcanic Impacts on Glacier Surface Morphology., , , , , and . Remote. Sens., 13 (17): 3453 (2021)