Author of the publication

A Metric for Machine Learning Vulnerability to Adversarial Examples.

, and . INFOCOM Workshops, page 1-2. IEEE, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Driven Edge Intelligence for Robust Network Anomaly Detection., , and . IEEE Trans. Netw. Sci. Eng., 7 (3): 1481-1492 (2020)Towards Adaptive Zero Trust Model for Secure AI., , and . CNS, page 1-2. IEEE, (2023)Shellcoding: Hunting for Kernel32 Base Address., and . INFOCOM Workshops, page 1-2. IEEE, (2022)Automated Post-Breach Penetration Testing through Reinforcement Learning., , and . CNS, page 1-2. IEEE, (2020)Real-Time Detection of Voids in Asphalt Pavement Based on Swin-Transformer-Improved YOLOv5., , , , , , , and . IEEE Trans. Intell. Transp. Syst., 25 (3): 2615-2626 (March 2024)Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code., , , and . CoRR, (2024)Certifiable and Efficient Autonomous Cyber-Physical Systems Design., , , , and . VLSID, page 259-263. IEEE, (2024)Safety-Aware Flexible Schedule Synthesis for Cyber-Physical Systems Using Weakly-Hard Constraints., , , , and . ASP-DAC, page 46-51. ACM, (2023)Safety-Aware Implementation of Control Tasks via Scheduling with Period Boosting and Compressing., , , , , and . RTCSA, page 196-205. IEEE, (2023)MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking., , , and . RAID, page 609-622. ACM, (2023)