From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Rethinking the Reverse-engineering of Trojan Triggers., , , , и . CoRR, (2022)Neural Network Trojans Analysis and Mitigation from the Input Domain., , , и . CoRR, (2022)AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts., , , и . USENIX Security Symposium, стр. 373-390. USENIX Association, (2023)Procedural Learning With Robust Visual Features via Low Rank Prior., , , , , и . IEEE Access, (2019)Adversarial Feature Genome: a Data Driven Adversarial Examples Recognition Method., , , , , , и . CoRR, (2018)Understanding the Importance of Single Directions via Representative Substitution., , , , , и . CoRR, (2019)Understanding the Importance of Single Directions via Representative Substitution., , , , , и . CoRR, (2018)Merlin: Multi-tier Optimization of eBPF Code for Performance and Compactness., , , и . ASPLOS (3), стр. 639-653. ACM, (2024)Training with More Confidence: Mitigating Injected and Natural Backdoors During Training., , , и . NeurIPS, (2022)ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning., , , и . USENIX Security Symposium, стр. 3023-3040. USENIX Association, (2021)