Author of the publication

Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding.

, , and . IJCNN, page 1-8. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MuSe-Personalization 2023: Feature Engineering, Hyperparameter Optimization, and Transformer-Encoder Re-discovery., , , and . MuSe@ACM Multimedia, page 89-97. ACM, (2023)Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding., , and . IJCNN, page 1-8. IEEE, (2019)Investigating the significance of adversarial attacks and their relation to interpretability for radar-based human activity recognition systems., , , , , and . Comput. Vis. Image Underst., (2021)Leveraging Human-Machine Interactions for Computer Vision Dataset Quality Enhancement., , , , , , , , and . IHCI (1), volume 14531 of Lecture Notes in Computer Science, page 295-309. Springer, (2023)Developing a Segmentation Model for Microscopic Images of Microplastics Isolated from Clams., , , , , , , and . ICPR Workshops (6), volume 12666 of Lecture Notes in Computer Science, page 86-97. Springer, (2020)3-D Deep Learning-Based Item Classification for Belt Conveyors Targeting Packaging and Logistics., , , and . ICPR Workshops (4), volume 12664 of Lecture Notes in Computer Science, page 578-591. Springer, (2020)Selection of Source Images Heavily Influences the Effectiveness of Adversarial Attacks., , , and . BMVC, page 331. BMVA Press, (2021)A Principled Evaluation Protocol for Comparative Investigation of the Effectiveness of DNN Classification Models on Similar-but-non-identical Datasets., , , and . CoRR, (2022)Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation., , and . MICCAI (2), volume 11765 of Lecture Notes in Computer Science, page 300-308. Springer, (2019)Perturbation analysis of gradient-based adversarial attacks., , , and . Pattern Recognit. Lett., (2020)