Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Learning Meets Generative Models: Can Proxy Distributions Improve Adversarial Robustness?, , , , , , and . ICLR, OpenReview.net, (2022)Differentially Private Data Generative Models., , , , , , and . CoRR, (2018)MultiRobustBench: Benchmarking Robustness Against Multiple Attacks., , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 6760-6785. PMLR, (2023)A Two-Stage Formation Flying Strategy to Reduce the Mission Time., and . SoSE, page 1-4. IEEE, (2007)Cyber-Physical Attack-Oriented Industrial Control Systems (ICS) Modeling, Analysis and Experiment Environment., , , , , , and . IIH-MSP, page 322-326. IEEE, (2015)Generating 3D Adversarial Point Clouds., , and . CVPR, page 9136-9144. Computer Vision Foundation / IEEE, (2019)Position Paper: Beyond Robustness Against Single Attack Types., , , and . CoRR, (2024)APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis., , , and . GLOBECOM, page 1-7. IEEE, (2018)No-jump-into-latency in China's internet!: toward last-mile hop count based IP geo-localization., , , , , , , and . IWQoS, page 42:1-42:10. ACM, (2019)Industrial Control System Fingerprinting and Anomaly Detection., , , , and . Critical Infrastructure Protection, volume 466 of IFIP Advances in Information and Communication Technology, page 73-85. Springer, (2015)