From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality., , и . ACM Conference on Computer and Communications Security, стр. 2565-2567. ACM, (2019)Is Data Clustering in Adversarial Settings Secure?, , , , , и . CoRR, (2018)Randomized Prediction Games for Adversarial Machine Learning., , , , и . CoRR, (2016)secml: Secure and explainable machine learning in Python., , , , , и . SoftwareX, (2022)A survey and experimental evaluation of image spam filtering techniques., , , и . Pattern Recognit. Lett., 32 (10): 1436-1446 (2011)FADER: Fast adversarial example rejection., , , , и . Neurocomputing, (2022)Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates., , , , , , и . CoRR, (2024)Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions., , , , , , и . CoRR, (2021)Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks., , и . ACM Comput. Surv., 52 (4): 78:1-78:36 (2019)Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning., , , , , , , , , и . ACM Comput. Surv., 55 (13s): 294:1-294:39 (2023)