Author of the publication

Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification.

, , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A global fit of top quark effective theory to data, , , , , , and . (2015)cite arxiv:1506.08845Comment: Additional references and preprint code added. Minor error in generation of plots fixed, no conclusions affected.Mobile multimedia services for third generation communications systems., , , , , , and . VTC Fall, page 2589-2593. IEEE, (2001)Unsupervised Parsimonious Cluster-Based Anomaly Detection (PCAD)., , and . MLSP, page 1-6. IEEE, (2018)Sequential anomaly detection in a batch with growing number of tests: Application to network intrusion detection., , and . MLSP, page 1-6. IEEE, (2012)Hierarchical shaped deficit round-robin scheduling., , and . GLOBECOM, page 6. IEEE, (2005)Telemedicine Using Free Voice over Internet Protocol (VoIP) Technology., , , , , and . MMVR, volume 163 of Studies in Health Technology and Informatics, page 369-371. IOS Press, (2011)The Combined Use of SkypeTM and the STORZ CMACTM Video Laryngoscope in Field Intubation Training with the Nebraska National Air Guard., , , , , and . MMVR, volume 163 of Studies in Health Technology and Informatics, page 83-85. IOS Press, (2011)User Preference Comparing a Conventional Videolaryngoscope Blade vs. a Novel Suction Videolaryngoscope Blade in Simulated Hemorrhagic Airway Intubation., , , and . MMVR, volume 173 of Studies in Health Technology and Informatics, page 72-74. IOS Press, (2012)A generative semi-supervised model for multi-view learning when some views are label-free., , and . ICASSP, page 3302-3306. IEEE, (2013)A study on the feasibility of low probability of intercept sonar., , , and . CISS, page 284-289. IEEE, (2009)