Vorobeychik, Yevgeniy
72  results:
Search for persons X
?
1

A Visual Active Search Framework for Geospatial Exploration:

, In: 2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV),
Sarkar, Anindya ; Lanier, Michael ; Alfeld, Scott... - p. 8301-8310 , 2024
 
?
2

Reward Delay Attacks on Deep Reinforcement Learning:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
?
3

UMINT-FS: UMINT-guided Feature Selection for multi-omics da..:

, In: 2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM),
Maitra, Chayan ; Seal, Dibyendu B. ; Das, Vivek.. - p. 594-601 , 2023
 
?
4

Certified Robust Control under Adversarial Perturbations:

, In: 2023 American Control Conference (ACC),
Yang, Jinghan ; Kim, Hunmin ; Wan, Wenbin.. - p. 4090-4095 , 2023
 
?
5

SlowLiDAR: Increasing the Latency of LiDAR-Based Detection ..:

, In: 2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR),
Liu, Han ; Wu, Yuhao ; Yu, Zhiyuan.. - p. 5146-5155 , 2023
 
?
6

Characterizing and Improving the Robustness of Predict-Then..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
Johnson-Yu, Sonja ; Finocchiaro, Jessie ; Wang, Kai... - p. 133-152 , 2023
 
?
7

Group-Fair Classification with Strategic Agents:

, In: Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency,
Estornell, Andrew ; Das, Sanmay ; Liu, Yang. - p. 389-399 , 2023
 
?
8

Eroding Trust in Aerial Imagery: Comprehensive Analysis and..:

, In: 2023 IEEE Applied Imagery Pattern Recognition Workshop (AIPR),
 
?
9

PROVES: Establishing Image Provenance using Semantic Signat..:

, In: 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV),
Xie, Mingyang ; Kulshrestha, Manav ; Wang, Shaojie... - p. 3017-3026 , 2022
 
?
10

Adversarial Robustness of Deep Sensor Fusion Models:

, In: 2022 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV),
Wang, Shaojie ; Wu, Tong ; Chakrabarti, Ayan. - p. 1371-1380 , 2022
 
?
11

Just Resource Allocation? How Algorithmic Predictions and H..:

, In: Proceedings of the 23rd ACM Conference on Economics and Computation,
Kube, Amanda ; Das, Sanmay ; Fowler, Patrick J.. - p. 1184-1242 , 2022
 
?
12

When Evil Calls : Targeted Adversarial Voice over IP Net..:

, In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security,
Liu, Han ; Yu, Zhiyuan ; Zha, Mingming... - p. 2009-2023 , 2022
 
?
13

Simulation-Based Optimization as a Service for Dynamic Data..:

, In: Handbook of Dynamic Data Driven Applications Systems,
Li, Yi ; Shekhar, Shashank ; Vorobeychik, Yevgeniy.. - p. 603-627 , 2021
 
?
14

Strategic Evasion of Centrality Measures:

, In: Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems,
Waniek, Marcin ; Woźnica, Jan ; Zhou, Kai... - p. 1389-1397 , 2021
 
?
15

Strategic Remote Attestation: Testbed for Internet-of-Thing..:

, In: Lecture Notes in Computer Science; Decision and Game Theory for Security,
 
1-15