From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Randomized Prediction Games for Adversarial Machine Learning., , , , и . CoRR, (2016)Is Data Clustering in Adversarial Settings Secure?, , , , , и . CoRR, (2018)Image Spam Filtering by Content Obscuring Detection., , , и . CEAS, (2007)Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality., , и . ACM Conference on Computer and Communications Security, стр. 2565-2567. ACM, (2019)FADER: Fast adversarial example rejection., , , , и . Neurocomputing, (2022)secml: Secure and explainable machine learning in Python., , , , , и . SoftwareX, (2022)Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation., , , , и . CoRR, (2022)Why Adversarial Reprogramming Works, When It Fails, and How to Tell the Difference., , , , , , , и . CoRR, (2021)Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks., , , , , , , , и . CoRR, (2023)Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates., , , , , , и . CoRR, (2024)