Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Emergence of Addictive Behaviors in Reinforcement Learning Agents., , and . SafeAI@AAAI, volume 2301 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)Founding The Domain of AI Forensics., and . CoRR, (2019)A Game-Theoretic Model for Analysis and Design of Self-organization Mechanisms in IoT., and . GAMENETS, volume 212 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 74-85. Springer, (2017)TaCo: Enhancing Cross-Lingual Transfer for Low-Resource Languages in LLMs through Translation-Assisted Chain-of-Thought Processes., and . CoRR, (2023)Adversarial Exploitation of Emergent Dynamics in Smart Cities., and . ISC2, page 1-8. IEEE, (2018)Models and Framework for Adversarial Attacks on Complex Adaptive Systems., and . CoRR, (2017)Adversarial Label-Poisoning Attacks and Defense for General Multi-Class Models Based on Synthetic Reduced Nearest Neighbor., , , , and . ICIP, page 3717-3722. IEEE, (2022)Adversarial Stimuli: Attacking Brain-Computer Interfaces via Perturbed Sensory Events., and . SMC, page 3061-3066. IEEE, (2023)Sentimental LIAR: Extended Corpus and Deep Learning Models for Fake Claim Classification., and . ISI, page 1-6. IEEE, (2020)Tracing Relevant Twitter Accounts Active in Cyber Threat Intelligence Domain by Exploiting Content and Structure of Twitter Network., , , and . ISI, page 1-6. IEEE, (2021)