Author of the publication

Adversarial Training of Self-supervised Monocular Depth Estimation against Physical-World Attacks.

, , , , and . ICLR, OpenReview.net, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Piccolo: Exposing Complex Backdoors in NLP Transformer Models., , , , , and . SP, page 2025-2042. IEEE, (2022)Code Search based on Context-aware Code Translation., , , , , and . ICSE, page 388-400. ACM, (2022)Hard-label Black-box Universal Adversarial Patch Attack., , , , and . USENIX Security Symposium, page 697-714. USENIX Association, (2023)ParaFuzz: An Interpretability-Driven Technique for Detecting Poisoned Samples in NLP., , , , , , and . NeurIPS, (2023)PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In Binary Code Analysis., , , , , , , , and . USENIX Security Symposium, page 2365-2382. USENIX Association, (2023)RULER: discriminative and iterative adversarial training for deep neural network fairness., , , , and . ESEC/SIGSOFT FSE, page 1173-1184. ACM, (2022)ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation., , , , , , , , , and 1 other author(s). NDSS, The Internet Society, (2021)Attacks Meet Interpretability: Attribute-steered Detection of Adversarial Samples., , , and . NeurIPS, page 7728-7739. (2018)OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary., , , , , , , and . SP, page 813-832. IEEE, (2021)Backdoor Scanning for Deep Neural Networks through K-Arm Optimization., , , , , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 9525-9536. PMLR, (2021)