Author of the publication

Automated Side-Channel Attacks using Black-Box Neural Architecture Search.

, , and . ARES, page 5:1-5:11. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From knowledge-based to data-driven fuzzy modeling - Development, criticism, and alternative directions.. Inform. Spektrum, 38 (6): 500-509 (2015)Hybrid Ranking and Regression for Algorithm Selection., , , and . KI, volume 12325 of Lecture Notes in Computer Science, page 59-72. Springer, (2020)A Notion of Comparative Probabilistic Entropy Based on the Possibilistic Specificity Ordering., and . ECSQARU, volume 3571 of Lecture Notes in Computer Science, page 848-859. Springer, (2005)Weighted Rank Correlation: A Flexible Approach Based on Fuzzy Order Relations., and . ECML/PKDD (2), volume 9285 of Lecture Notes in Computer Science, page 422-437. Springer, (2015)Towards Green Automated Machine Learning: Status Quo and Future Directions., , , , , and . J. Artif. Intell. Res., (2023)Learning from Imprecise and Fuzzy Observations: Data Disambiguation through Generalized Loss Minimization. CoRR, (2013)Fuzzy methods for case-based recommendation and decision support., , and . J. Intell. Inf. Syst., 27 (2): 95-115 (2006)Consistent Multilabel Ranking through Univariate Losses., , and . ICML, icml.cc / Omnipress, (2012)Regularized Learning with Flexible Constraints.. IDA, volume 2810 of Lecture Notes in Computer Science, page 13-24. Springer, (2003)Optimizing the F-Measure in Multi-Label Classification: Plug-in Rule Approach versus Structured Loss Minimization., , , , and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 1130-1138. JMLR.org, (2013)