Author of the publication

Unreasonable Effectiveness of Last Hidden Layer Activations for Adversarial Robustness.

, , and . COMPSAC, page 1098-1103. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numerical Integration Methods for Simulation of Mass-Spring-Damper Systems., and . ISCIS, page 435-438. Springer, (2011)Unsupervised textile defect detection using convolutional neural networks., and . Appl. Soft Comput., 113 (Part): 107913 (2021)Semi-Automatic Adaptation of High-Polygon Wireframe Face Models Through Inverse Perspective Projection., , , and . ISCIS, page 315-321. Springer, (2011)The routine design-modular distributed modeling platform for distributed routine design and simulation-based testing of distributed assemblies., , and . Artif. Intell. Eng. Des. Anal. Manuf., 22 (1): 1-18 (2008)Factored particle filtering with dependent and constrained partition dynamics for tracking deformable objects.. Mach. Vis. Appl., 25 (7): 1825-1840 (2014)Unreasonable Effectiveness of Last Hidden Layer Activations for Adversarial Robustness., , and . COMPSAC, page 1098-1103. IEEE, (2022)Real-time defect detection in power conduction devices for rail transportation., , and . SIU, page 782-785. IEEE, (2014)Driver Recognition Using Gaussian Mixture Models and Decision Fusion Techniques., , and . ISICA, volume 5370 of Lecture Notes in Computer Science, page 803-811. Springer, (2008)Closeness and Uncertainty Aware Adversarial Examples Detection in Adversarial Machine Learning., , and . CoRR, (2020)Palmprint Verification Using SIFT Majority Voting., and . ISCIS, page 291-297. Springer, (2011)