Author of the publication

Generating Distributional Adversarial Examples to Evade Statistical Detectors.

, , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 10895-10911. PMLR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks., , , , and . USENIX Security Symposium, page 497-514. USENIX Association, (2019)Understanding, Uncovering, and Mitigating the Causes of Inference Slowdown for Language Models., , , and . SaTML, page 723-740. IEEE, (2024)When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks., , , , and . USENIX Security Symposium, page 1299-1316. USENIX Association, (2018)A Panda? No, It's a Sloth: Slowdown Attacks on Adaptive Multi-Exit Neural Network Inference., , , and . ICLR, OpenReview.net, (2021)When Does Data Augmentation Help With Membership Inference Attacks?, and . ICML, volume 139 of Proceedings of Machine Learning Research, page 5345-5355. PMLR, (2021)Security Analysis of Deep Neural Networks Operating in the Presence of Cache Side-Channel Attacks., , , , , , , and . CoRR, (2018)How to 0wn NAS in Your Spare Time., , , , and . CoRR, (2020)The Limitations of Deep Learning Methods in Realistic Adversarial Settings.. University of Maryland, College Park, MD, USA, (2023)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/30868).Qu-ANTI-zation: Exploiting Quantization Artifacts for Achieving Adversarial Outcomes., , , and . NeurIPS, page 9303-9316. (2021)Shallow-Deep Networks: Understanding and Mitigating Network Overthinking., , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 3301-3310. PMLR, (2019)