Search for persons
X
?
Image Analysis and Processing - ICIAP 2023 Workshops; Lecture Notes in Computer Science ,
1
Generating Invariance-Based Adversarial Examples: Bringing ..:
, In:
?
Engineering Applications of Neural Networks; Communications in Computer and Information Science ,
3
Pruning for Power: Optimizing Energy Efficiency in IoT with..:
, In:
?
Proceedings of the 2023 8th International Conference on Machine Learning Technologies ,
4
On the Effect of Adversarial Training Against Invariance-ba..:
, In:
?
Proceedings of the 2023 8th International Conference on Machine Learning Technologies ,
5
HE-MAN – Homomorphically Encrypted MAchine learning with oN..:
, In:
?
Image Analysis and Processing – ICIAP 2022; Lecture Notes in Computer Science ,
6
Pruning in the Face of Adversaries:
, In:
?
Image Analysis and Processing – ICIAP 2022; Lecture Notes in Computer Science ,
7
U Can't (re)Touch This – A Deep Learning Approach for Detec..:
, In:
?
Proceedings of the 16th International Conference on Availability, Reliability and Security ,
10
Adversarial Examples Against a BERT ABSA Model – Fooling Be..:
, In:
?
Lecture Notes in Computer Science; Decision and Game Theory for Security ,
11
When Should You Defend Your Classifier?: – A Game-Theoretic..:
, In:
?
Proceedings of the 21st Annual Conference on Information Technology Education ,
12
Continuous Planning and Forecasting Framework (CPFF) for Ag..:
, In:
?
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security ,
14
Forensics of High Quality and Nearly Identical JPEG Image R..:
, In:
?
Proceedings of the 2nd ACM workshop on Information hiding and multimedia security ,
15