Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction., , , , and . CoRR, (2019)Enhancing Cross-Task Black-Box Transferability of Adversarial Examples With Dispersion Reduction., , , , , , and . CVPR, page 937-946. Computer Vision Foundation / IEEE, (2020)Dirty Road Can Attack: Security of Deep Learning based Automated Lane Centering under Physical-World Attack., , , , , and . USENIX Security Symposium, page 3309-3326. USENIX Association, (2021)Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking., , , , , and . CoRR, (2019)Dissecting VOD services for cellular: performance, root causes and best practices., , , and . Internet Measurement Conference, page 220-234. ACM, (2017)Towards Practical Lottery Ticket Hypothesis for Adversarial Training., , , , , , and . CoRR, (2020)Program Analysis Based Approaches to Ensure Security and Safety of Emerging Software Platforms.. University of Michigan, USA, (2018)ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield., , , , , , and . CCSW, page 43. ACM, (2019)Demo: Mapping global mobile performance trends with mobilyzer and mobiPerf., , , , , and . MobiSys, page 353. ACM, (2014)Explainable machine learning in deployment., , , , , , , , , and . FAT*, page 648-657. ACM, (2020)