Author of the publication

Adversarial Active Learning in the Presence of Weak and Malicious Oracles.

, , and . PAKDD (Workshops), volume 11607 of Lecture Notes in Computer Science, page 77-89. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially Private Causal Inference Under Hierarchical Design., and . ICDM (Workshops), page 1390-1399. IEEE, (2023)Spatial counts under differential privacy mechanism on changing spatial scales., , and . Comput. Secur., (2018)Gaussian Mixture Models for Classification and Hypothesis Tests Under Differential Privacy., , , and . DBSec, volume 10359 of Lecture Notes in Computer Science, page 123-141. Springer, (2017)Mixture of gaussian models and bayes error under differential privacy., , and . CODASPY, page 179-190. ACM, (2011)Robust Weighted Regression for Ultrasound Image Super-Resolution., and . ICME Workshops, page 1-6. IEEE Computer Society, (2018)A smart hill-climbing algorithm for application server configuration., , , , and . WWW, page 287-296. ACM, (2004)Network Tomography: A Review and Recent Developments, , , and . Frontiers in Statistics, chapter 16, World Scientific, (July 2006)Adversarial Data Mining: Big Data Meets Cyber Security., and . ACM Conference on Computer and Communications Security, page 1866-1867. ACM, (2016)Adversarial Active Learning in the Presence of Weak and Malicious Oracles., , and . PAKDD (Workshops), volume 11607 of Lecture Notes in Computer Science, page 77-89. Springer, (2019)Fast local polynomial regression approach for speckle noise removal., and . ICPR, page 3198-3203. IEEE, (2016)