Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Near-Optimal Evasion of Convex-Inducing Classifiers., , , , , , , , and . AISTATS, volume 9 of JMLR Proceedings, page 549-556. JMLR.org, (2010)Stealthy poisoning attacks on PCA-based anomaly detectors., , , , , , , and . SIGMETRICS Perform. Evaluation Rev., 37 (2): 73-74 (2009)Support Vector Machines under Adversarial Label Contamination., , , , , and . CoRR, (2022)Evasion attacks against machine learning at test time, , , , , , , and . Joint European Conference on Machine Learning and Knowledge Discovery in Databases, page 387--402. Springer, (2013)Query Strategies for Evading Convex-Inducing Classifiers., , , , , , and . J. Mach. Learn. Res., (2012)ANTIDOTE: understanding and defending against poisoning of anomaly detectors., , , , , , , and . Internet Measurement Conference, page 1-14. ACM, (2009)Differential Privacy for Bayesian Inference through Posterior Sampling., , , , and . J. Mach. Learn. Res., (2017)Tree of Attacks: Jailbreaking Black-Box LLMs Automatically., , , , , , and . CoRR, (2023)Evading Anomaly Detection through Variance Injection Attacks on PCA., , , , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 394-395. Springer, (2008)