Author of the publication

Generating Adversarial Examples with Task Oriented Multi-Objective Optimization.

, , , , , and . Trans. Mach. Learn. Res., (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An efficient semi-supervised SVM for anomaly detection., and . IJCNN, page 2843-2850. IEEE, (2017)Exploiting Certified Defences to Attack Randomised Smoothing., , , , and . CoRR, (2023)Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness., , , , , , , , and . AAAI, page 14783-14791. AAAI Press, (2023)Information-theoretic Source Code Vulnerability Highlighting., , , , , and . IJCNN, page 1-8. IEEE, (2021)Deep Domain Adaptation for Vulnerable Code Function Identification., , , , , , , and . IJCNN, page 1-8. IEEE, (2019)The Security of Fixed versus Random Elliptic Curves in Cryptography., , , and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 55-66. Springer, (2003)Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence., , , , , , , , and . IJCNN, page 1-8. IEEE, (2020)Transferable Graph Backdoor Attack., , , , , , , and . RAID, page 321-332. ACM, (2022)The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves., , , and . Int. J. Inf. Sec., 3 (2): 86-98 (2004)A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis., and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 214-225. Springer, (2002)