From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attribution-driven Causal Analysis for Detection of Adversarial Examples., , , , , , , и . CoRR, (2019)On the Robustness of AlphaFold: A COVID-19 Case Study., , , , , , , и . CoRR, (2023)XMAP: Programming Memristor Crossbars for Analog Matrix-Vector Multiplication: Toward High Precision Using Representable Matrices., , , и . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 41 (6): 1827-1841 (2022)Attribution-Based Confidence Metric for Detection of Adversarial Attacks on Breast Histopathological Images., , , и . ECCV Workshops (1), том 13801 из Lecture Notes in Computer Science, стр. 501-516. Springer, (2022)On-policy Q-learning for adaptive optimal control., и . ADPRL, стр. 1-6. IEEE, (2014)Predicting Heart Rate Variations of Deepfake Videos using Neural ODE., , , , , , и . ICCV Workshops, стр. 1721-1729. IEEE, (2019)In-Memory Execution of Compute Kernels Using Flow-Based Memristive Crossbar Computing., , , , и . ICRC, стр. 1-6. IEEE, (2017)The cardinality-constrained paths problem: Multicast data routing in heterogeneous communication networks., , , , и . NCA, стр. 126-130. IEEE Computer Society, (2016)SATYA : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing., , , и . FPS, том 10723 из Lecture Notes in Computer Science, стр. 277-292. Springer, (2017)Adversarial attacks on computer vision algorithms using natural perturbations., , , , , , и . IC3, стр. 1-6. IEEE Computer Society, (2017)