From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Rethinking data augmentation for adversarial robustness, , , , , , , и . Information Sciences, (2024)Towards more Practical Threat Models in Artificial Intelligence Security., , , и . CoRR, (2023)Why is Machine Learning Security so hard?. Saarland University, Saarbrücken, Germany, (2020)An Argument-based Approach to Mining Opinions from Twitter., , и . AT, том 918 из CEUR Workshop Proceedings, стр. 408-422. CEUR-WS.org, (2012)Do winning tickets exist before DNN training?, и . SDM, стр. 549-557. SIAM, (2021)Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks., , и . ICPR, стр. 4696-4703. IEEE, (2020)MLCapsule: Guarded Offline Deployment of Machine Learning as a Service., , , , , , и . CVPR Workshops, стр. 3300-3309. Computer Vision Foundation / IEEE, (2021)Testing autonomous vehicles and AI: perspectives and challenges from cybersecurity, transparency, robustness and fairness., , , , , , , , , и 2 other автор(ы). CoRR, (2024)Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions., , , , , , и . CoRR, (2021)Mental Models of Adversarial Machine Learning., , , и . CoRR, (2021)