From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Family Reunion: Adversarial Machine Learning meets Digital Watermarking.. MPS@CCS, стр. 1. ACM, (2018)Adversarial Machine Learning Against Digital Watermarking., и . EUSIPCO, стр. 519-523. IEEE, (2018)No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning., , , , , и . USENIX Security Symposium, стр. 5109-5126. USENIX Association, (2023)When Papers Choose Their Reviewers: Adversarial Machine Learning in Peer Review.. ARTMAN@CCS, стр. 3. ACM, (2023)CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery., , , и . DBSec, том 13942 из Lecture Notes in Computer Science, стр. 282-301. Springer, (2023)Quantifying the Risk of Wormhole Attacks on Bluetooth Contact Tracing., , и . CODASPY, стр. 264-275. ACM, (2022)Explaining Graph Neural Networks for Vulnerability Discovery., , , и . AISec@CCS, стр. 145-156. ACM, (2021)Broken Promises: Measuring Confounding Effects in Learning-based Vulnerability Discovery., , , , , и . AISec@CCS, стр. 149-160. ACM, (2023)Learning Type Inference for Enhanced Dataflow Analysis., , , , , и . ESORICS (4), том 14347 из Lecture Notes in Computer Science, стр. 184-203. Springer, (2023)Visualization of anomaly detection using prediction sensitivity., , , и . Sicherheit, том P-62 из LNI, стр. 197-208. GI, (2005)