From post

CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion.

, , , , и . EMNLP (Findings), стр. 2903-2913. Association for Computational Linguistics, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Stronger Targeted Poisoning Attacks Against Malware Detection., , , , , , и . CANS, том 12579 из Lecture Notes in Computer Science, стр. 65-84. Springer, (2020)On Embedding Backdoor in Malware Detectors Using Machine Learning., , , , , и . PST, стр. 1-5. IEEE, (2019)Identifying Adversarial Sentences by Analyzing Text Complexity., , , и . CoRR, (2019)A metric of identification performance of biometrics based on information content., , , и . ICARCV, стр. 1274-1279. IEEE, (2010)On Partitioning Secret Data Based on Concept of Functional Safety., и . WISA, том 9503 из Lecture Notes in Computer Science, стр. 110-121. Springer, (2015)Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme., , и . BIOSIG, том P-196 из LNI, стр. 1-6. GI, (2012)additionally published as volume P-196 in the "Lecture Notes in Informatics" (LNI) series.Active Attack Against Oblivious RAM., , , и . AINA, стр. 744-751. IEEE Computer Society, (2018)AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning., , и . CODASPY, стр. 325-336. ACM, (2024)Membership Inference Attacks against GNN-based Hardware Trojan Detection., , , , , и . TrustCom, стр. 1222-1229. IEEE, (2023)Prioritizing Vulnerability Assessment Items Using LLM Based on IoT Device Documentations., , , , , , и . IOTSMS, стр. 147-152. IEEE, (2024)