From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Randomized Prediction Games for Adversarial Machine Learning., , , , и . CoRR, (2016)Poster: Attacking Malware Classifiers by Crafting Gradient-Attacks that Preserve Functionality., , и . ACM Conference on Computer and Communications Security, стр. 2565-2567. ACM, (2019)Is Data Clustering in Adversarial Settings Secure?, , , , , и . CoRR, (2018)A survey and experimental evaluation of image spam filtering techniques., , , и . Pattern Recognit. Lett., 32 (10): 1436-1446 (2011)secml: Secure and explainable machine learning in Python., , , , , и . SoftwareX, (2022)Image Spam Filtering by Content Obscuring Detection., , , и . CEAS, (2007)FADER: Fast adversarial example rejection., , , , и . Neurocomputing, (2022)Multimodal Anti-spoofing in Biometric Recognition Systems., , , , и . Handbook of Biometric Anti-Spoofing, Springer, (2014)Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning., , , , , , , , , и . ACM Comput. Surv., 55 (13s): 294:1-294:39 (2023)Digital Investigation of PDF Files: Unveiling Traces of Embedded Malware., и . IEEE Secur. Priv., 17 (1): 63-71 (2019)