Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN), , , , , , , and . CoRR, (2011)Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification., and . ACSAC, page 278-287. ACM, (2017)Attacking Graph-based Classification via Manipulating the Graph Structure., and . ACM Conference on Computer and Communications Security, page 2023-2040. ACM, (2019)Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes., , and . CoRR, (2020)EviHunter: Identifying Digital Evidence in the Permanent Storage of Android Devices via Static Analysis., , , and . ACM Conference on Computer and Communications Security, page 1338-1350. ACM, (2018)IPGuard: Protecting the Intellectual Property of Deep Neural Networks via Fingerprinting the Classification Boundary., , and . CoRR, (2019)Backdoor Attacks to Graph Neural Networks., , , and . SACMAT, page 15-26. ACM, (2021)Semi-Supervised Node Classification on Graphs: Markov Random Fields vs. Graph Neural Networks., , and . CoRR, (2020)Generation-based fuzzing? Don't build a new generator, reuse!, , , , , and . Comput. Secur., (June 2023)Prompt Injection Attacks and Defenses in LLM-Integrated Applications., , , , and . CoRR, (2023)