Author of the publication

Revealing Perceptible Backdoors in DNNs, Without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic.

, , , and . MLSP, page 1-6. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical shaped deficit round-robin scheduling., , and . GLOBECOM, page 6. IEEE, (2005)A Maximum Entropy Framework for Semisupervised and Active Learning With Unknown and Label-Scarce Classes., , and . IEEE Trans. Neural Networks Learn. Syst., 28 (4): 917-933 (2017)Uninterpreted Schema Matching with Embedded Value Mapping under Opaque Column Names and Data Values., , and . IEEE Trans. Knowl. Data Eng., 22 (2): 291-304 (2010)User Preference Comparing a Conventional Videolaryngoscope Blade vs. a Novel Suction Videolaryngoscope Blade in Simulated Hemorrhagic Airway Intubation., , , and . MMVR, volume 173 of Studies in Health Technology and Informatics, page 72-74. IOS Press, (2012)Telemedicine Using Free Voice over Internet Protocol (VoIP) Technology., , , , , and . MMVR, volume 163 of Studies in Health Technology and Informatics, page 369-371. IOS Press, (2011)Joint Parsimonious Modeling and Model Order Selection for Multivariate Gaussian Mixtures., and . J. Sel. Topics Signal Processing, 4 (3): 548-559 (2010)The Combined Use of SkypeTM and the STORZ CMACTM Video Laryngoscope in Field Intubation Training with the Nebraska National Air Guard., , , , , and . MMVR, volume 163 of Studies in Health Technology and Informatics, page 83-85. IOS Press, (2011)A global fit of top quark effective theory to data, , , , , , and . (2015)cite arxiv:1506.08845Comment: Additional references and preprint code added. Minor error in generation of plots fixed, no conclusions affected.Simulation of a Semiconductor Manufacturing Line.. Commun. ACM, 33 (10): 98-108 (1990)When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers., , and . CoRR, (2018)