Search for persons
X
?
2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
1
A Visual Active Search Framework for Geospatial Exploration:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
2
Reward Delay Attacks on Deep Reinforcement Learning:
, In:
?
2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM) ,
3
UMINT-FS: UMINT-guided Feature Selection for multi-omics da..:
, In:
?
2023 American Control Conference (ACC) ,
4
Certified Robust Control under Adversarial Perturbations:
, In:
?
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) ,
5
SlowLiDAR: Increasing the Latency of LiDAR-Based Detection ..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
6
Characterizing and Improving the Robustness of Predict-Then..:
, In:
?
Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency ,
7
Group-Fair Classification with Strategic Agents:
, In:
?
2023 IEEE Applied Imagery Pattern Recognition Workshop (AIPR) ,
8
Eroding Trust in Aerial Imagery: Comprehensive Analysis and..:
, In:
?
2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
9
PROVES: Establishing Image Provenance using Semantic Signat..:
, In:
?
2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
10
Adversarial Robustness of Deep Sensor Fusion Models:
, In:
?
Proceedings of the 23rd ACM Conference on Economics and Computation ,
11
Just Resource Allocation? How Algorithmic Predictions and H..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
12
When Evil Calls : Targeted Adversarial Voice over IP Net..:
, In:
?
Handbook of Dynamic Data Driven Applications Systems ,
13
Simulation-Based Optimization as a Service for Dynamic Data..:
, In:
?
Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems ,
14
Strategic Evasion of Centrality Measures:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
15