Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression., , , and . CoRR, (2018)Task-Agnostic Graph Neural Network Evaluation via Adversarial Collaboration., , , , and . CoRR, (2023)Architectural Backdoors in Neural Networks., , , , and . CVPR, page 24595-24604. IEEE, (2023)Towards Certifiable Adversarial Sample Detection., , , and . AISec@CCS, page 13-24. ACM, (2020)FlexWAN: Software Hardware Co-design for Cost-Effective and Resilient Optical Backbones., , , , , , , , , and 1 other author(s). SIGCOMM, page 319-332. ACM, (2023)Revisiting Structured Dropout., , , and . ACML, volume 222 of Proceedings of Machine Learning Research, page 1699-1714. PMLR, (2023)Redundancy-Reduced MobileNet Acceleration on Reconfigurable Logic for ImageNet Classification., , , , , , and . ARC, volume 10824 of Lecture Notes in Computer Science, page 16-28. Springer, (2018)Latent Diffusion Model for DNA Sequence Generation., , , , , , and . CoRR, (2023)LLM4DV: Using Large Language Models for Hardware Test Stimuli Generation., , , , and . CoRR, (2023)Pay Attention to Features, Transfer Learn Faster CNNs., , , , , and . ICLR, OpenReview.net, (2020)