From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks., и . CoRR, (2017)Hard to Forget: Poisoning Attacks on Certified Machine Unlearning., , и . AAAI, стр. 7691-7700. AAAI Press, (2022)Geometric & Topological Representations of Maximum Classes with Applications to Sample Compression., и . COLT, стр. 299-310. Omnipress, (2008)Sublinear-Time Adaptive Data Analysis., , и . ISAIM, (2018)Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems., , , и . SP, стр. 473-488. IEEE, (2022)Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge., , и . IJCNN, стр. 1825-1834. IEEE, (2011)Evading Anomaly Detection through Variance Injection Attacks on PCA., , , , , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 394-395. Springer, (2008)Transferring Troubles: Cross-Lingual Transferability of Backdoor Attacks in LLMs with Instruction Tuning., , , , , , и . CoRR, (2024)It's Simplex! Disaggregating Measures to Improve Certified Robustness., , , , и . CoRR, (2023)Predicting dynamic spectrum allocation: a review covering simulation, modelling, and prediction., , , , и . Artif. Intell. Rev., 56 (10): 10921-10959 (октября 2023)