Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generating Adversarial Examples with Adversarial Networks., , , , , and . IJCAI, page 3905-3911. ijcai.org, (2018)Towards Stable and Efficient Training of Verifiably Robust Neural Networks., , , , , and . CoRR, (2019)Spatially Transformed Adversarial Examples., , , , , and . ICLR (Poster), OpenReview.net, (2018)WIPI: A New Web Threat for LLM-Driven Web Agents., , , and . CoRR, (2024)A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems., , , , and . CoRR, (2024)Can Shape Structure Features Improve Model Robustness under Diverse Adversarial Settings?, , , , , , and . ICCV, page 7506-7515. IEEE, (2021)Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving., , , , , , , , and . CoRR, (2019)DeceptPrompt: Exploiting LLM-driven Code Generation via Adversarial Natural Language Instructions., , and . CoRR, (2023)Benchmarking Robustness of 3D Point Cloud Recognition Against Common Corruptions., , , , , and . CoRR, (2022)A Learning-based Declarative Privacy-Preserving Framework for Federated Data Management., , , , , , , , , and 1 other author(s). CoRR, (2024)