Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robustness via curvature regularization, and vice versa, , , and . (2018)cite arxiv:1811.09716.Universal Adversarial Perturbations., , , and . CVPR, page 86-94. IEEE Computer Society, (2017)Neural Anisotropy Directions., , , and . NeurIPS, (2020)Robustness via Curvature Regularization, and Vice Versa., , , and . CVPR, page 9078-9086. Computer Vision Foundation / IEEE, (2019)Adversarial training may be a double-edged sword., , and . CoRR, (2021)Understanding Catastrophic Overfitting in Adversarial Training., and . CoRR, (2021)How to choose your best allies for a transferable attack?, , and . ICCV, page 4519-4528. IEEE, (2023)GeoDA: A Geometric Framework for Black-Box Adversarial Attacks., , , and . CVPR, page 8443-8452. Computer Vision Foundation / IEEE, (2020)Vehicle trajectory prediction works, but not everywhere., , , , , , and . CVPR, page 17102-17112. IEEE, (2022)PRIME: A Few Primitives Can Boost Robustness to Common Corruptions., , , , and . ECCV (25), volume 13685 of Lecture Notes in Computer Science, page 623-640. Springer, (2022)