Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Stochastic Emergency Response Location Model Considering Secondary Incidents on Freeways., , and . IEEE Trans. Intell. Transp. Syst., 17 (9): 2528-2540 (2016)Adversarial Vulnerabilities of Deep Networks and Affordable Robustness.. University of Maryland, College Park, MD, USA, (2020)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/26479).Batch-wise Logit-Similarity: Generalizing Logit-Squeezing and Label-Smoothing., , , , , and . BMVC, page 72. BMVA Press, (2019)Transferable Clean-Label Poisoning Attacks on Deep Neural Nets., , , , , , and . CoRR, (2019)Breaking Certified Defenses: Semantic Adversarial Examples with Spoofed robustness Certificates., , and . ICLR, OpenReview.net, (2020)An iterative school decomposition algorithm for solving the multi-school bus routing and scheduling problem., , and . CoRR, (2017)Adversarial Attacks on Copyright Detection Systems., , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 8307-8315. PMLR, (2020)Are adversarial examples inevitable?, , , , and . ICLR (Poster), OpenReview.net, (2019)Understanding and Visualizing the District of Columbia Capital Bikeshare System Using Data Analysis for Balancing Purposes., , and . CoRR, (2017)Adversarially robust transfer learning., , , , , , and . CoRR, (2019)