From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations., , , , и . CoRR, (2020)Nebula: Self-Attention for Dynamic Malware Analysis., , , и . CoRR, (2023)A Survey on Reinforcement Learning Security with Application to Autonomous Driving., , , , , , , и . CoRR, (2022)Explaining Vulnerabilities of Deep Learning to Adversarial Malware Binaries., , , , и . ITASEC, том 2315 из CEUR Workshop Proceedings, CEUR-WS.org, (2019)Robust Machine Learning for Malware Detection over Time., , , и . ITASEC, том 3260 из CEUR Workshop Proceedings, стр. 169-180. CEUR-WS.org, (2022)Detecting Attacks Against Deep Reinforcement Learning for Autonomous Driving., , , , , , и . ICMLC, стр. 57-62. IEEE, (2023)secml: Secure and explainable machine learning in Python., , , , , и . SoftwareX, (2022)Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates., , , , , , и . CoRR, (2024)Hardening RGB-D Object Recognition Systems against Adversarial Patch Attacks., , , , , , , , и . CoRR, (2023)Denial-of-Service Attack on Object Detection Model Using Universal Adversarial Perturbation., , , , и . CoRR, (2022)