Personensuche
X
?
2024 IEEE Security and Privacy Workshops (SPW) ,
1
Certifying Safety in Reinforcement Learning under Adversari..:
, In:
?
2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
2
A Visual Active Search Framework for Geospatial Exploration:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
3
Characterizing and Improving the Robustness of Predict-Then..:
, In:
?
2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) ,
4
UMINT-FS: UMINT-guided Feature Selection for multi-omics da..:
, In:
?
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) ,
5
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection ..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
6
Reward Delay Attacks on Deep Reinforcement Learning:
, In:
?
2023 IEEE Applied Imagery Pattern Recognition Workshop (AIPR) ,
7
Eroding Trust in Aerial Imagery: Comprehensive Analysis and..:
, In:
?
Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency ,
8
Group-Fair Classification with Strategic Agents:
, In:
?
2023 American Control Conference (ACC) ,
9
Certified Robust Control under Adversarial Perturbations:
, In:
?
Proceedings of the 23rd ACM Conference on Economics and Computation ,
10
Just Resource Allocation? How Algorithmic Predictions and H..:
, In:
?
2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
11
PROVES: Establishing Image Provenance using Semantic Signat..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
12
When Evil Calls : Targeted Adversarial Voice over IP Net..:
, In:
?
2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
13
Adversarial Robustness of Deep Sensor Fusion Models:
, In:
?
Machine Learning and Knowledge Discovery in Databases. Research Track; Lecture Notes in Computer Science ,
14
PATHATTACK: Attacking Shortest Paths in Complex Networks:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
15