Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Parallelization Techniques for Verifying Neural Networks., , , , , , , , , and . CoRR, (2020)On the probabilistic analysis of neural networks., , , and . SEAMS@ICSE, page 5-8. ACM, (2020)Case Study: Analysis of Autonomous Center Line Tracking Neural Networks., , , and . VSTTE, volume 13124 of Lecture Notes in Computer Science, page 104-121. Springer, (2021)Rule-Based Runtime Mitigation Against Poison Attacks on Neural Networks., , , and . RV, volume 13498 of Lecture Notes in Computer Science, page 67-84. Springer, (2022)Symbolic Execution for Importance Analysis and Adversarial Generation in Neural Networks., , , , , and . ISSRE, page 313-322. IEEE, (2019)MedKnowts: Unified Documentation and Information Retrieval for Electronic Health Records., , , , , and . UIST, page 1169-1183. ACM, (2021)Concept-based Analysis of Neural Networks via Vision-Language Models., , , , , , and . CoRR, (2024)Finding Invariants in Deep Neural Networks., , , and . CoRR, (2019)An overview of structural coverage metrics for testing neural networks., , , , , and . Int. J. Softw. Tools Technol. Transf., 25 (3): 393-405 (June 2023)AntidoteRT: Run-time Detection and Correction of Poison Attacks on Neural Networks., , , and . CoRR, (2022)