From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adversarial examples in remote sensing., , , , и . SIGSPATIAL/GIS, стр. 408-411. ACM, (2018)Objectness-Guided Open Set Visual Search and Closed Set Detection., , , , и . CoRR, (2020)Functional Map of the World., , , и . CVPR, стр. 6172-6180. Computer Vision Foundation / IEEE Computer Society, (2018)Fortifying Federated Learning against Membership Inference Attacks via Client-level Input Perturbation., , , , , , и . DSN, стр. 288-301. IEEE, (2023)Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning., , , , , , и . USENIX Security Symposium, стр. 211-228. USENIX Association, (2023)The TrojAI Software Framework: An OpenSource tool for Embedding Trojans into Deep Learning Models., , и . CoRR, (2020)Attack Agnostic Detection of Adversarial Examples via Random Subspace Analysis., , и . WACV, стр. 2815-2825. IEEE, (2022)Continual Reinforcement Learning with TELLA., , , , и . CoRR, (2022)Random Projections for Adversarial Attack Detection., , и . CoRR, (2020)The Active Sensing Testbed., , и . AAAI, стр. 16108-16110. AAAI Press, (2021)