Author of the publication

Towards an Empirical Robustness Assessment Through Measuring Adversarial Subspaces.

, , and . AST@ICSE, page 120-124. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending UTP 2 with cascading arbitration specifications., , and . A-TEST@ESEC/SIGSOFT FSE, page 8-14. ACM, (2019)Fuzzing of Mobile Application in the Banking Domain: a Case Study., , , and . QRS Companion, page 485-491. IEEE, (2020)Evolution of the UML Interactions Metamodel., , and . MoDELS, volume 8107 of Lecture Notes in Computer Science, page 405-421. Springer, (2013)Risk-based testing of Bluetooth functionality in an automotive environment., , , , , , and . Automotive - Safety & Security, volume P-210 of LNI, page 211-228. GI, (2012)Advanced Test Modelling and Execution Based on the International Standardized Techniques TTCN-3 and UTP., , , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 245-252. Springer, (2014)Model-Based Security Testing, , and . MBT, volume 80 of EPTCS, page 1-12. (2012)Gaining Certainty About Uncertainty - Testing Cyber-Physical Systems in the Presence of Uncertainties at the Application Level., , and . RISK, volume 10224 of Lecture Notes in Computer Science, page 129-142. (2016)Enabling Data Flows in UML Interactions., , and . MODELSWARD, page 250-257. SciTePress, (2016)Attack-based Automation of Security Testing for IoT Applications with Genetic Algorithms and Fuzzing., , , and . QRS Companion, page 92-100. IEEE, (2021)Combining Risk Analysis and Security Testing., , , and . ISoLA (2), volume 8803 of Lecture Notes in Computer Science, page 322-336. Springer, (2014)