Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hiding Needles in a Haystack: Towards Constructing Neural Networks that Evade Verification., , , and . IH&MMSec, page 51-62. ACM, (2022)Towards Inferring Ratings from User Behavior in BitTorrent Communities., , , and . WETICE, page 217-222. IEEE Computer Society, (2010)Analecta nova ad historiam renascentium in Hungaria litterarum spectantia, and . Victoris Hornyánszky, Budapestini, (1903)Detecting concept drift in fully distributed environments., , and . SISY, page 183-188. IEEE, (2012)Adversarial robustness of linear models: regularization and dimensionality., , and . ESANN, (2019)Attacking Model Sets with Adversarial Examples., , and . ESANN, page 1-6. (2020)Novel Balanced Feature Representation for Wikipedia Vandalism Detection Task - Lab Report for PAN at CLEF 2010., , , and . CLEF (Notebook Papers/LABs/Workshops), volume 1176 of CEUR Workshop Proceedings, CEUR-WS.org, (2010)Opinion Mining by Transformation-Based Domain Adaptation., , and . TSD, volume 6231 of Lecture Notes in Computer Science, page 157-164. Springer, (2010)Fully distributed robust singular value decomposition., , , and . P2P, page 1-9. IEEE, (2014)Gossip-based distributed stochastic bandit algorithms., , , , , and . ICML (3), volume 28 of JMLR Workshop and Conference Proceedings, page 19-27. JMLR.org, (2013)