Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic., , and . CoRR, (2019)Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs., and . IEEE J. Sel. Areas Commun., 25 (6): 1113-1123 (2007)Network NonNeutrality on the Internet: Content Provision Under a Subscription Revenue Model., , and . SIGMETRICS Perform. Evaluation Rev., 42 (3): 44 (2014)A Game of Uncoordinated Sharing of Private Spectrum Commons., , and . SIGMETRICS Perform. Evaluation Rev., 42 (3): 42 (2014)Relative entropy between Markov transition rate matrices., and . IEEE Trans. Inf. Theory, 39 (3): 1056-1057 (1993)Generation bidding game with potentially false attestation of flexible demand., , , , , , and . EURASIP J. Adv. Signal Process., (2015)A taxonomy of internet traceback., and . Int. J. Secur. Networks, 1 (1/2): 54-61 (2006)Revealing Backdoors, Post-Training, in DNN Classifiers via Novel Inference on Optimized Perturbations Inducing Group Misclassification., , and . ICASSP, page 3827-3831. IEEE, (2020)Guest Editorial Special Issue on Traffic Forensics: Systems, Tools, and Experimentations., , , and . IEEE Syst. J., 12 (1): 7-9 (2018)Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set., , , and . Neural Comput., 33 (5): 1329-1371 (2021)