From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

AdvDO: Realistic Adversarial Attacks for Trajectory Prediction., , , , и . ECCV (5), том 13665 из Lecture Notes in Computer Science, стр. 36-52. Springer, (2022)Characterizing Attacks on Deep Reinforcement Learning., , , , , , , , и . AAMAS, стр. 1010-1018. International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS), (2022)Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations., , , , , , и . NeurIPS, (2020)AugMax: Adversarial Composition of Random Augmentations for Robust Training., , , , , и . NeurIPS, стр. 237-250. (2021)Test-Time Prompt Tuning for Zero-Shot Generalization in Vision-Language Models., , , , , , и . NeurIPS, (2022)SemanticAdv: Generating Adversarial Examples via Attribute-Conditioned Image Editing., , , , , и . ECCV (14), том 12359 из Lecture Notes in Computer Science, стр. 19-37. Springer, (2020)Tagoram: real-time tracking of mobile RFID tags to high precision using COTS devices., , , , , и . MobiCom, стр. 237-248. ACM, (2014)Cognitive Overload: Jailbreaking Large Language Models with Overloaded Logical Thinking., , , , , и . CoRR, (2023)Behavior Privacy Preserving in RF Sensing., , , , , и . IEEE Trans. Dependable Secur. Comput., 20 (1): 784-796 (2023)Test-time Backdoor Mitigation for Black-Box Large Language Models with Defensive Demonstrations., , , , , , и . CoRR, (2023)