Author of the publication

New Passive and Active Attacks on Deep Neural Networks in Medical Applications.

, , , , , , , and . ICCAD, page 39:1-39:9. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Interpolating Sequent Calculus for Quantifier-Free Presburger Arithmetic., , , and . IJCAR, volume 6173 of Lecture Notes in Computer Science, page 384-399. Springer, (2010)Strengthening properties using abstraction refinement., , and . DATE, page 1692-1697. IEEE, (2009)Infinite-state backward exploration of Boolean broadcast programs., and . FMCAD, page 155-162. IEEE, (2014)Unbounded-Thread Reachability via Symbolic Execution and Loop Acceleration (Technical Report)., and . CoRR, (2015)Finding Lean Induced Cycles in Binary Hypercubes., , , and . SAT, volume 5584 of Lecture Notes in Computer Science, page 18-31. Springer, (2009)Identifying volatile numeric expressions in numeric computing applications., , , and . Math. Comput. Simul., (2019)Export restrictions, urban unemployment, and the location of processing activities, and . Economics Letters, 71 (1): 105--110 (April 2001)Intrinsic Examples: Robust Fingerprinting of Deep Neural Networks., , , , , , , and . BMVC, page 46. BMVA Press, (2021)Algebraic fault analysis of SHA-3., , , and . DATE, page 151-156. IEEE, (2017)Sensitive Samples Revisited: Detecting Neural Network Attacks Using Constraint Solvers., , , and . SCSS, volume 342 of EPTCS, page 35-48. (2021)