Author of the publication

Do Bayesian variational autoencoders know what they don't know?

, and . UAI, volume 180 of Proceedings of Machine Learning Research, page 718-727. PMLR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Do Bayesian variational autoencoders know what they don't know?, and . UAI, volume 180 of Proceedings of Machine Learning Research, page 718-727. PMLR, (2022)Digital Forgetting Using Key Decay., and . SAC, page 34-41. ACM, (2023)Hybroid: Toward Android Malware Detection and Categorization with Program Code and Network Traffic., , , and . ISC, volume 13118 of Lecture Notes in Computer Science, page 259-278. Springer, (2021)Detecting and categorizing Android malware with graph neural networks., , and . SAC, page 409-412. ACM, (2021)HawkEye: Cross-Platform Malware Detection with Representation Learning on Graphs., , , and . ICANN (3), volume 12893 of Lecture Notes in Computer Science, page 127-138. Springer, (2021)Hiding Behind the Shoulders of Giants: Abusing Crawlers for Indirect Web Attacks., and . PST, page 355-364. IEEE Computer Society, (2017)Follow the WhiteRabbit: Towards Consolidation of On-the-Fly Virtualization and Virtual Machine Introspection., , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 263-277. Springer, (2018)The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security.. ICCST, page 1-6. IEEE, (2014)Can Today's Machine Learning Pass Image-Based Turing Tests?, , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 129-148. Springer, (2019)Free Willy: Prune System Calls to Enhance Software Security., , and . SAC, page 1522-1529. ACM, (2023)