From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time., , и . Neural Comput., 31 (8): 1624-1670 (2019)A model of network neutrality with usage-based prices., , , , , и . Telecommun. Syst., 52 (2): 601-609 (2013)Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing., , и . CoRR, (2020)Extremal shape-controlled traffic patterns in high-speed networks., и . IEEE Trans. Commun., 48 (5): 813-819 (2000)L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set., , и . CoRR, (2020)Improved Generative Semisupervised Learning Based on Finely Grained Component-Conditional Class Labeling., , , и . Neural Comput., 24 (7): 1926-1966 (2012)Preliminary results using scale-down to explore worm dynamics., , , и . WORM, стр. 65-72. ACM Press, (2004)Margin-maximizing feature elimination methods for linear and nonlinear kernel-based discriminant functions., , , и . IEEE Trans. Neural Networks, 21 (5): 701-717 (2010)A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters., , , и . CoRR, (2018)When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers., , и . CoRR, (2018)