Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

RVPLAYER: Robotic Vehicle Forensics by Replay with What-if Reasoning., , and . NDSS, The Internet Society, (2022)Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles., , , , and . RAID, page 349-364. USENIX Association, (2020)Detecting Attacks Against Robotic Vehicles: A Control Invariant Approach., , , , , , , and . CCS, page 801-816. ACM, (2018)Fusion is Not Enough: Single-Modal Attacks to Compromise Fusion Models in Autonomous Driving., , , , , , , and . CoRR, (2023)Role of Orthogonality Constraints in Improving Properties of Deep Networks for Image Classification., , and . CoRR, (2020)Interpretable COVID-19 Chest X-Ray Classification via Orthogonality Constraint., , , , and . CoRR, (2021)PI-Net: A Deep Learning Approach to Extract Topological Persistence Images., , , , and . CVPR Workshops, page 3639-3648. Computer Vision Foundation / IEEE, (2020)AMC-Loss: Angular Margin Contrastive Loss for Improved Explainability in Image Classification., , and . CVPR Workshops, page 3659-3666. Computer Vision Foundation / IEEE, (2020)Physical Attack on Monocular Depth Estimation with Optimal Adversarial Patches., , , , , , and . ECCV (38), volume 13698 of Lecture Notes in Computer Science, page 514-532. Springer, (2022)Cyber-Physical Inconsistency Vulnerability Identification for Safety Checks in Robotic Vehicles., , , , and . CCS, page 263-278. ACM, (2020)