Author of the publication

Investigating the significance of adversarial attacks and their relation to interpretability for radar-based human activity recognition systems.

, , , , , and . Comput. Vis. Image Underst., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding., , and . IJCNN, page 1-8. IEEE, (2019)BRCA Gene Mutations in dbSNP: A Visual Exploration of Genetic Variants., , , , and . CoRR, (2023)Know Your Self-supervised Learning: A Survey on Image-based Generative and Discriminative Training., , , , , , , and . Trans. Mach. Learn. Res., (2023)How the Softmax Output is Misleading for Evaluating the Strength of Adversarial Examples., , and . CoRR, (2018)Automatic Detection of Trypanosomosis in Thick Blood Smears Using Image Pre-processing and Deep Learning., , , , , and . IHCI (2), volume 12616 of Lecture Notes in Computer Science, page 254-266. Springer, (2020)Self-supervised Benchmark Lottery on ImageNet: Do Marginal Improvements Translate to Improvements on Similar Datasets?, , , , and . IJCNN, page 1-8. IEEE, (2024)Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks., , , and . BMVC, page 331. BMVA Press, (2021)Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation., , and . MICCAI (2), volume 11765 of Lecture Notes in Computer Science, page 300-308. Springer, (2019)Perturbation analysis of gradient-based adversarial attacks., , , and . Pattern Recognit. Lett., (2020)