43 results on '"Kathrin Grosse"'
Search Results
2. When Your AI Becomes a Target: AI Security Incidents and Best Practices.
3. Machine Learning Security Against Data Poisoning: Are We There Yet?
4. Towards More Practical Threat Models in Artificial Intelligence Security.
5. Testing autonomous vehicles and AI: perspectives and challenges from cybersecurity, transparency, robustness and fairness.
6. Machine Learning Security in Industry: A Quantitative Survey.
7. Adversarial vulnerability bounds for Gaussian process classification.
8. Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning.
9. Industrial practitioners' mental models of adversarial machine learning.
10. Rethinking data augmentation for adversarial robustness.
11. Towards more Practical Threat Models in Artificial Intelligence Security.
12. Manipulating Trajectory Prediction with Backdoors.
13. MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
14. Do winning tickets exist before DNN training?
15. On the Security Relevance of Initial Weights in Deep Neural Networks.
16. Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks.
17. 'Why do so?' - A Practical Perspective on Machine Learning Security.
18. A Survey on Reinforcement Learning Security with Application to Autonomous Driving.
19. Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning.
20. Machine Learning Security against Data Poisoning: Are We There Yet?
21. Mental Models of Adversarial Machine Learning.
22. Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions.
23. Backdoor smoothing: Demystifying backdoor attacks on deep neural networks.
24. Adversarial Examples for Malware Detection.
25. How many winning tickets are there in one DNN?
26. Adversarial Examples and Metrics.
27. A new measure for overfitting and its implications for backdooring of deep learning.
28. Adversarial Initialization - when your network performs the way I want.
29. Adversarial Vulnerability Bounds for Gaussian Process Classification.
30. A First Approach to Mining Opinions as Multisets through Argumentation.
31. An Argument-based Approach to Mining Opinions from Twitter.
32. Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
33. The Limitations of Model Uncertainty in Adversarial Settings.
34. MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
35. Integrating argumentation and sentiment analysis for mining opinions from Twitter.
36. On the (Statistical) Detection of Adversarial Examples.
37. Empowering an E-Government Platform Through Twitter-Based Arguments.
38. Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
39. Machine Learning Security in Industry: A Quantitative Survey
40. Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks
41. MLCapsule: Guarded Offline Deployment of Machine Learning as a Service
42. Integrating argumentation and sentiment analysis for mining opinions from Twitter
43. Propanmissbrauch
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.