Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Black-box Attacks on Deep Neural Networks via Gradient Estimation., , , and . ICLR (Workshop), OpenReview.net, (2018)Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries., , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 863-873. PMLR, (2021)Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker., , , , , , and . CoRR, (2023)Analyzing Federated Learning through an Adversarial Lens., , , and . CoRR, (2018)Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples., , , , , , and . CoRR, (2019)DARTS: Deceiving Autonomous Cars with Toxic Signs., , , , and . CoRR, (2018)A Critical Evaluation of Open-World Machine Learning., , , and . CoRR, (2020)NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation., , , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 8 (1): 11:1-11:32 (2024)PAC-learning in the presence of adversaries., , and . NeurIPS, page 228-239. (2018)SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification., , , , and . AISTATS, volume 151 of Proceedings of Machine Learning Research, page 7587-7624. PMLR, (2022)