Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Security and Sparsity of Linear Classifiers for Adversarial Settings., , , , and . CoRR, (2017)Evasion attacks against machine learning at test time, , , , , , , and . Joint European Conference on Machine Learning and Knowledge Discovery in Databases, page 387--402. Springer, (2013)Poisoning Behavioral Malware Clustering., , , , , , and . CoRR, (2018)Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks., , , , , , , and . USENIX Security Symposium, page 321-338. USENIX Association, (2019)Minimizing Energy Consumption of Deep Learning Models by Energy-Aware Training., , , , , , and . ICIAP (2), volume 14234 of Lecture Notes in Computer Science, page 515-526. Springer, (2023)Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples., , , , , , and . NeurIPS, (2022)Information fusion for computer security: State of the art and open issues., , , , and . Inf. Fusion, 10 (4): 274-284 (2009)Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware., , and . CoRR, (2022)Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks., , , and . ICCST, page 1-8. IEEE, (2011)Slope: A First-order Approach for Measuring Gradient Obfuscation., , , , and . ESANN, (2021)