From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Thwarting finite difference adversarial attacks with output randomization., , , и . CoRR, (2019)Generation & Evaluation of Adversarial Examples for Malware Obfuscation., , и . ICMLA, стр. 1283-1290. IEEE, (2019)Adversary Safety by Construction in a Language of Cryptographic Protocols., , , , , , , и . CSF, стр. 412-427. IEEE, (2022)Disparities in Coded and Imputed Post-Traumatic Stress Disorder and Self-Harm Among US Veterans., , , , , , , , , и 2 other автор(ы). AMIA, AMIA, (2021)Short Paper: Creating Adversarial Malware Examples using Code Insertion., , и . CoRR, (2019)On-Device Bug Reporting for Android Applications., , , , , и . MOBILESoft@ICSE, стр. 215-216. IEEE, (2017)Open Science principles for accelerating trait-based science across the Tree of Life, , , , , , , , , и 27 other автор(ы). Nature Ecology & Evolution, (2021)On-Device Bug Reporting for Android Applications., , , , , и . CoRR, (2018)Enhancing Brain Flow Visualization with Automated 3D Data Processing: A Study on DCE-MRI Data from Mice with Tumors., , , , , , , , , и . Web3D, стр. 24:1-24:5. ACM, (2023)Towards detecting evasive malware in the age of smart adversaries.. Rensselaer Polytechnic Institute, USA, (2021)