From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks., и . CoRR, (2017)Hard to Forget: Poisoning Attacks on Certified Machine Unlearning., , и . AAAI, стр. 7691-7700. AAAI Press, (2022)Geometric & Topological Representations of Maximum Classes with Applications to Sample Compression., и . COLT, стр. 299-310. Omnipress, (2008)Sublinear-Time Adaptive Data Analysis., , и . ISAIM, (2018)Et Tu Certifications: Robustness Certificates Yield Better Adversarial Examples., , , , и . ICML, OpenReview.net, (2024)Validity: a framework for cross-disciplinary collaboration in mining indicators of learning from MOOC forums., , , , и . LAK, стр. 546-547. ACM, (2016)E-Storm: Replication-Based State Management in Distributed Stream Processing Systems., , , , и . ICPP, стр. 571-580. IEEE Computer Society, (2017)Evading Anomaly Detection through Variance Injection Attacks on PCA., , , , , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 394-395. Springer, (2008)Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge., , и . IJCNN, стр. 1825-1834. IEEE, (2011)Securing Cyber-Physical Systems: Physics-Enhanced Adversarial Learning for Autonomous Platoons., , , и . ECML/PKDD (3), том 13715 из Lecture Notes in Computer Science, стр. 269-285. Springer, (2022)