Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CAAD 2018: Generating Transferable Adversarial Examples., , and . CoRR, (2018)Demo2Code: From Summarizing Demonstrations to Synthesizing Code via Extended Chain-of-Thought., , , and . CoRR, (2023)EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples., , , , and . AAAI, page 10-17. AAAI Press, (2018)Attacking the Madry Defense Model with $L_1$-based Adversarial Examples., and . ICLR (Workshop), OpenReview.net, (2018)On the Effectiveness of Low Frequency Perturbations., , and . IJCAI, page 3389-3396. ijcai.org, (2019)Are Generative Classifiers More Robust to Adversarial Attacks?, , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 3804-3814. PMLR, (2019)HistoTransfer: Understanding Transfer Learning for Histopathology., , , and . BHI, page 1-4. IEEE, (2021)Weakly Supervised Deep Instance Nuclei Detection using Points Annotation in 3D Cardiovascular Immunofluorescent Images., , , , and . MLHC, volume 182 of Proceedings of Machine Learning Research, page 565-584. PMLR, (2022)Comparative Analytical Study of Two Different Drug Regimens in Treatment of Covid 19 Positive Patients in Index Medical College Hospital and Research Center, Indore, India, , , , and . International Journal of Health and Clinical Research, 4 (6): 265-267 (2021)Attribute Diversity Determines the Systematicity Gap in VQA., , , , and . CoRR, (2023)