Author of the publication

Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights.

, , , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Practical Robustness Analysis for DNNs based on PAC-Model Learning., , , , , and . ICSE, page 2189-2201. ACM, (2022)Enhancing Robustness Verification for Deep Neural Networks via Symbolic Propagation., , , , , , , and . Formal Aspects Comput., 33 (3): 407-435 (2021)Safety Analysis of Autonomous Driving Systems Based on Model Learning., , , , , and . CoRR, (2022)Improving Neural Network Verification through Spurious Region Guided Refinement., , , , , , , and . TACAS (1), volume 12651 of Lecture Notes in Computer Science, page 389-408. Springer, (2021)ADVREPAIR: Provable Repair of Adversarial Attack., , , , , , and . CoRR, (2024)Improving Neural Network Verification through Spurious Region Guided Refinement., , , , , , , and . CoRR, (2020)Ensemble Defense with Data Diversity: Weak Correlation Implies Strong Robustness., , , , , , and . CoRR, (2021)Reach-avoid Analysis for Stochastic Discrete-time Systems., , , and . ACC, page 4879-4885. IEEE, (2021)Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights., , , , , , , and . CoRR, (2023)PRODeep: a platform for robustness verification of deep neural networks., , , , , , , and . ESEC/SIGSOFT FSE, page 1630-1634. ACM, (2020)