Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spatially Transformed Adversarial Examples., , , , , and . ICLR (Poster), OpenReview.net, (2018)RelViT: Concept-guided Vision Transformer for Visual Relational Reasoning., , , , , , , and . ICLR, OpenReview.net, (2022)Generating Adversarial Examples with Adversarial Networks., , , , , and . IJCAI, page 3905-3911. ijcai.org, (2018)Can Shape Structure Features Improve Model Robustness under Diverse Adversarial Settings?, , , , , , and . ICCV, page 7506-7515. IEEE, (2021)Semantic Adversarial Attacks via Diffusion Models., , , , , and . BMVC, page 271. BMVA Press, (2023)CSI: Enhancing the Robustness of 3D Point Cloud Recognition against Corruption., , and . CoRR, (2023)PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition., , , , and . CoRR, (2022)Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving., , , , , , , , and . ACM Conference on Computer and Communications Security, page 2267-2281. ACM, (2019)Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features., , , , , and . USENIX Security Symposium, page 285-302. USENIX Association, (2019)SMACK: Semantically Meaningful Adversarial Audio Attack., , , and . USENIX Security Symposium, page 3799-3816. USENIX Association, (2023)