Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Black-box Attacks on Deep Neural Networks via Gradient Estimation., , , and . ICLR (Workshop), OpenReview.net, (2018)Lower Bounds on Cross-Entropy Loss in the Presence of Test-time Adversaries., , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 863-873. PMLR, (2021)Characterizing the Optimal 0-1 Loss for Multi-class Classification with a Test-time Attacker., , , , , , and . CoRR, (2023)Analyzing Federated Learning through an Adversarial Lens., , , and . CoRR, (2018)DARTS: Deceiving Autonomous Cars with Toxic Signs., , , , and . CoRR, (2018)A Critical Evaluation of Open-World Machine Learning., , , and . CoRR, (2020)Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples., , , , , , and . CoRR, (2019)NetDiffusion: Network Data Augmentation Through Protocol-Constrained Traffic Generation., , , , , , and . Proc. ACM Meas. Anal. Comput. Syst., 8 (1): 11:1-11:32 (2024)SparseFed: Mitigating Model Poisoning Attacks in Federated Learning with Sparsification., , , , and . AISTATS, volume 151 of Proceedings of Machine Learning Research, page 7587-7624. PMLR, (2022)PAC-learning in the presence of adversaries., , and . NeurIPS, page 228-239. (2018)