Author of the publication

Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning.

, , , , , , , , , and . ACM Comput. Surv., 55 (13s): 294:1-294:39 (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why template self-update should work in biometric authentication systems?, , , , and . ISSPA, page 1086-1091. IEEE, (2012)Stock Market Prediction by a Mixture of Genetic-Neural Experts., , and . Int. J. Pattern Recognit. Artif. Intell., 16 (5): 501-526 (2002)Multisensor Image Recognition by Neural Networks with Understandable Behavior.. Int. J. Pattern Recognit. Artif. Intell., 10 (8): 887-917 (1996)Pattern Recognition Systems under Attack: Design Issues and Research Challenges., , and . Int. J. Pattern Recognit. Artif. Intell., (2014)Infrared and visible image fusion using a shallow CNN and structural similarity constraint., , , , , and . IET Image Process., 14 (14): 3562-3571 (2020)Attention-Based Adversarial Robust Distillation in Radio Signal Classifications for Low-Power IoT Devices., , , , , and . IEEE Internet Things J., 10 (3): 2646-2657 (February 2023)Analysis of unsupervised template update in biometric recognition systems., , and . Pattern Recognit. Lett., (2014)Neural shape codes for 3D model retrieval., , , and . Pattern Recognit. Lett., (2015)Classification of multisensor remote-sensing images by structured neural networks., and . IEEE Trans. Geosci. Remote. Sens., 33 (3): 562-578 (1995)Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection., , , , , and . CoRR, (2020)