Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FRAUDability: Estimating Users' Susceptibility to Financial Fraud Using Adversarial Machine Learning., , , , and . CoRR, (2023)Anomaly Detection using Capsule Networks for High-dimensional Datasets., and . CoRR, (2021)Model-based Automation of Test Script Generation Across Product Variants: a Railway Perspective., , , , , and . AST@ICSE, page 20-29. IEEE, (2021)Toward Practical Adversarial Attacks on Face Verification Systems., , , and . BIOSIG, volume P-315 of LNI, page 113-124. Gesellschaft für Informatik e.V., (2021)A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems., , , , , and . CoRR, (2021)Performances evaluation of inverse kinematic models of a compact bionic handling assistant., , , , , and . ROBIO, page 264-269. IEEE, (2017)Comparison of cross-platform mobile development tools., , and . ICIN, page 179-186. IEEE, (2012)PH Model-Based Shape Reconstruction of Heterogeneous Continuum Closed Loop Kinematic Chain: An Application to Skipping Rope., , , , and . IROS, page 8682-8688. IEEE, (2018)KDDT: Knowledge Distillation-Empowered Digital Twin for Anomaly Detection., , , , and . ESEC/SIGSOFT FSE, page 1867-1878. ACM, (2023)An Improved Discovery Engine for Efficient and Intelligent Discovery of Web Service with Publication Facility., , , , and . SERVICES II, page 63-70. IEEE Computer Society, (2009)