From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cybersecurity and AI: The PRALab Research Experience., , , , , , , и . Ital-IA, том 3486 из CEUR Workshop Proceedings, стр. 426-431. CEUR-WS.org, (2023)Infinity-Norm Support Vector Machines Against Adversarial Label Contamination., , , , и . ITASEC, том 1816 из CEUR Workshop Proceedings, стр. 106-115. CEUR-WS.org, (2017)Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples., , , , , , , и . CoRR, (2021)Backdoor smoothing: Demystifying backdoor attacks on deep neural networks., , , , , и . Comput. Secur., (2022)Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems., , , и . Comput. Secur., (2022)Complex Data: Learning Trustworthily, Automatically, and with Guarantees., , , , , , , и . ESANN, (2021)Secure Kernel Machines against Evasion Attacks., , , , и . AISec@CCS, стр. 59-69. ACM, (2016)10th International Workshop on Artificial Intelligence and Security (AISec 2017)., , , и . CCS, стр. 2621-2622. ACM, (2017)Poisoning Attacks on Algorithmic Fairness., , и . ECML/PKDD (1), том 12457 из Lecture Notes in Computer Science, стр. 162-177. Springer, (2020)Bayesian Analysis of Linear Combiners., , и . MCS, том 4472 из Lecture Notes in Computer Science, стр. 292-301. Springer, (2007)