From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Black-box Attacks on Deep Neural Networks via Gradient Estimation., , , и . ICLR (Workshop), OpenReview.net, (2018)Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries., , , и . ICML, том 139 из Proceedings of Machine Learning Research, стр. 863-873. PMLR, (2021)Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker., , , , , , и . CoRR, (2023)SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification., , , , и . AISTATS, том 151 из Proceedings of Machine Learning Research, стр. 7587-7624. PMLR, (2022)Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples., , , , , , и . CoRR, (2019)Analyzing Federated Learning through an Adversarial Lens., , , и . CoRR, (2018)DARTS: Deceiving Autonomous Cars with Toxic Signs., , , , и . CoRR, (2018)PAC-learning in the presence of adversaries., , и . NeurIPS, стр. 228-239. (2018)NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation., , , , , , и . SIGMETRICS/Performance (Abstracts), стр. 85-86. ACM, (2024)NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation., , , , , , и . CoRR, (2023)