From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security Engineering. Wiley Computer Publishing, (2001)Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins., , и . GraMSec@FLoC, том 11086 из Lecture Notes in Computer Science, стр. 1-12. Springer, (2018)Reconciling Multiple Objectives - Politics or Markets? (Transcript of Discussion).. Security Protocols Workshop, том 10476 из Lecture Notes in Computer Science, стр. 157-170. Springer, (2017)The Taboo Trap: Behavioural Detection of Adversarial Samples., , , и . CoRR, (2018)A dynamic model of barter exchange., , , и . SODA, стр. 1925-1933. SIAM, (2015)Talking Trojan: Analyzing an Industry-Wide Disclosure., и . SCORED@CCS, стр. 83-92. ACM, (2022)Bad Characters: Imperceptible NLP Attacks., , , и . SP, стр. 1987-2004. IEEE, (2022)To Compress Or Not To Compress: Understanding The Interactions Between Adversarial Attacks And Neural Network Compression., , , и . SysML, mlsys.org, (2019)To compress or not to compress: Understanding the Interactions between Adversarial Attacks and Neural Network Compression., , , и . CoRR, (2018)Strong Mixed-Integer Programming Formulations for Trained Neural Networks., , , и . IPCO, том 11480 из Lecture Notes in Computer Science, стр. 27-42. Springer, (2019)