Author of the publication

Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity.

, , , , and . CoRR, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bridgeware: the air-gap malware., and . Commun. ACM, 61 (4): 74-82 (2018)Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup., , , and . CoRR, (2019)Leaking data from enterprise networks using a compromised smartwatch device., , and . SAC, page 741-750. ACM, (2018)Drones' Cryptanalysis - Smashing Cryptography with a Flicker., , , and . IEEE Symposium on Security and Privacy, page 1397-1414. IEEE, (2019)Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs., , , , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 223-237. Springer, (2011)9-1-1 DDoS: Attacks, Analysis and Mitigation., , and . EuroS&P, page 218-232. IEEE, (2017)PIT: A Probe Into Internet of Things by Comprehensive Security Analysis., , , and . TrustCom/BigDataSE, page 522-529. IEEE, (2019)BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness., , and . CoRR, (2020)Exploiting Reshaping Subgraphs from Bilateral Propagation Graphs., , , , , and . DASFAA (1), volume 10827 of Lecture Notes in Computer Science, page 342-351. Springer, (2018)Securing Android-Powered Mobile Devices Using SELinux., , and . IEEE Secur. Priv., 8 (3): 36-44 (2010)