From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems., , , , , , и . VTS, стр. 1-14. IEEE, (2022)Defensive approximation: securing CNNs using approximate computing., , , , , , и . ASPLOS, стр. 990-1003. ACM, (2021)Experimental Investigation on Weather Changes Influences on Wireless Localization System., , , , , и . M&N, стр. 1-6. IEEE, (2019)Physical Adversarial Attacks For Camera-based Smart Systems: Current Trends, Categorization, Applications, Research Challenges, and Future Outlook., , , и . CoRR, (2023)HEAP: A Heterogeneous Approximate Floating-Point Multiplier for Error Tolerant Applications., , , , , и . RSP, стр. 36-42. ACM, (2019)DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction., , , , и . CoRR, (2023)Exploring the Interplay of Interpretability and Robustness in Deep Neural Networks: A Saliency-guided Approach., , и . CoRR, (2024)SIT: Stochastic Input Transformation to Defend Against Adversarial Attacks on Deep Neural Networks., , , , и . IEEE Des. Test, 39 (3): 63-72 (2022)ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints., , , и . IJCNN, стр. 1-10. IEEE, (2022)ODDR: Outlier Detection & Dimension Reduction Based Defense Against Adversarial Patches., , , , и . CoRR, (2023)