From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Black-box Attacks on Deep Neural Networks via Gradient Estimation., , , и . ICLR (Workshop), OpenReview.net, (2018)Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries., , , и . ICML, том 139 из Proceedings of Machine Learning Research, стр. 863-873. PMLR, (2021)Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker., , , , , , и . CoRR, (2023)PAC-learning in the presence of evasion adversaries., , и . CoRR, (2018)LEAF: Navigating Concept Drift in Cellular Networks., , , , , , , и . PACMNET, 1 (CoNEXT2): 7:1-7:24 (2023)Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks., , , и . USENIX Security Symposium, стр. 3575-3592. USENIX Association, (2022)Patch-based Defenses against Web Fingerprinting Attacks., , , и . AISec@CCS, стр. 97-109. ACM, (2021)Analyzing the Robustness of Open-World Machine Learning., , , , , , и . AISec@CCS, стр. 105-116. ACM, (2019)Backdoor Attacks Against Deep Learning Systems in the Physical World., , , , , и . CVPR, стр. 6206-6215. Computer Vision Foundation / IEEE, (2021)Enhancing robustness of machine learning systems via data transformations., , , и . CISS, стр. 1-5. IEEE, (2018)