Author of the publication

Dataset Properties and Degradation of Machine Learning Accuracy with an Anonymized Training Dataset.

, , , and . CANDAR (Workshops), page 341-347. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption., and . ISPEC, volume 10701 of Lecture Notes in Computer Science, page 256-275. Springer, (2017)X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail., , , , , , and . CoRR, (2023)Dataset Properties and Degradation of Machine Learning Accuracy with an Anonymized Training Dataset., , , and . CANDAR (Workshops), page 341-347. IEEE, (2020)SHREC'08 entry: Semi-supervised learning for semantic 3D model retrieval., , , and . Shape Modeling International, page 241-243. IEEE Computer Society, (2008)Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models., , , , , and . CoRR, (2022)A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 150-164 (2020)Ranking on semantic manifold for shape-based 3d model retrieval., and . Multimedia Information Retrieval, page 411-418. ACM, (2008)Comparison of Dimension Reduction Methods for Database-Adaptive 3D Model Retrieval., , , and . Adaptive Multimedia Retrieval, volume 4918 of Lecture Notes in Computer Science, page 196-210. Springer, (2007)HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter., , , , , and . UMAP, page 143-152. ACM, (2022)First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data., , , , , , , and . CoRR, (2021)