Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial Perturbations Against Deep Neural Networks for Malware Classification., , , , and . CoRR, (2016)Adversarial Vulnerability Bounds for Gaussian Process Classification., , , and . CoRR, (2019)MLCapsule: Guarded Offline Deployment of Machine Learning as a Service., , , , , , and . CoRR, (2018)A First Approach to Mining Opinions as Multisets through Argumentation., , , and . AT, volume 8068 of Lecture Notes in Computer Science, page 195-209. Springer, (2013)An Argument-based Approach to Mining Opinions from Twitter., , and . AT, volume 918 of CEUR Workshop Proceedings, page 408-422. CEUR-WS.org, (2012)Adversarial Examples for Malware Detection., , , , and . ESORICS (2), volume 10493 of Lecture Notes in Computer Science, page 62-79. Springer, (2017)Adversarial Initialization - when your network performs the way I want., , , , and . CoRR, (2019)Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification., , and . CoRR, (2018)Empowering an E-Government Platform Through Twitter-Based Arguments., , , and . Inteligencia Artif., 15 (50): 46-56 (2012)Integrating argumentation and sentiment analysis for mining opinions from Twitter., , , and . AI Commun., 28 (3): 387-401 (2015)