Author of the publication

Unreasonable Effectiveness of Last Hidden Layer Activations for Adversarial Robustness.

, , and . COMPSAC, page 1098-1103. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging Structure., , , , , and . EICC, page 174-180. ACM, (2023)Closeness and Uncertainty Aware Adversarial Examples Detection in Adversarial Machine Learning., , and . CoRR, (2020)A Benchmark API Call Dataset for Windows PE Malware Classification., and . CoRR, (2019)Classification of Methamorphic Malware with Deep Learning(LSTM)., , and . SIU, page 1-4. IEEE, (2019)Incrementing Adversarial Robustness with Autoencoding for Machine Learning Model Attacks., , and . SIU, page 1-4. IEEE, (2019)Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining., , , , and . Int. J. Inf. Sec., 22 (2): 319-332 (April 2023)Hybrid AI-based Anomaly Detection Model using Phasor Measurement Unit Data., , , , and . CoRR, (2022)Bulut bilişim sistemlerinde eşle/indirge yöntemi uygulanarak veri madenciliği yazılım çatısının geliştirilmesi (Development of data mining software framework by using map/reduce method in cloud computing systems). İstanbul University, Turkey, (2014)Mitigating Attacks on Artificial Intelligence-based Spectrum Sensing for Cellular Network Signals., , , , and . GLOBECOM (Workshops), page 1371-1376. IEEE, (2022)Malware API Call Dataset.. (May 2022)