Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail., , , , , , and . CoRR, (2023)HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter., , , , , and . UMAP, page 143-152. ACM, (2022)Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models., , , , , and . CoRR, (2022)OOD-Robust Boosting Tree for Intrusion Detection Systems., and . IJCNN, page 1-10. IEEE, (2023)ASRA-Q: AI Security Risk Assessment by Selective Questions., , , , , , and . J. Inf. Process., (2023)Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey., , , , , and . IJCNN, page 1-10. IEEE, (2023)Dataset Properties and Degradation of Machine Learning Accuracy with an Anonymized Training Dataset., , , and . CANDAR (Workshops), page 341-347. IEEE, (2020)A Secure Framework for User-Key Provisioning to SGX Enclaves., , , , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 725-732. Springer, (2018)First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data., , , , , , , and . CoRR, (2021)A new approach for machine learning security risk assessment: work in progress., , , , , and . CAIN, page 52-53. ACM, (2022)