From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Spatially Transformed Adversarial Examples., , , , , и . ICLR (Poster), OpenReview.net, (2018)Towards Stable and Efficient Training of Verifiably Robust Neural Networks., , , , , и . CoRR, (2019)Generating Adversarial Examples with Adversarial Networks., , , , , и . IJCAI, стр. 3905-3911. ijcai.org, (2018)A Learning-based Declarative Privacy-Preserving Framework for Federated Data Management., , , , , , , , , и 1 other автор(ы). CoRR, (2024)DeceptPrompt: Exploiting LLM-driven Code Generation via Adversarial Natural Language Instructions., , и . CoRR, (2023)Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions., , , , , и . CoRR, (2022)A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems., , , , и . CoRR, (2024)CSI: Enhancing the Robustness of 3D Point Cloud Recognition against Corruption., , и . CoRR, (2023)Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving., , , , , , , , и . CoRR, (2019)PointDP: Diffusion-driven Purification against Adversarial Attacks on 3D Point Cloud Recognition., , , , и . CoRR, (2022)