Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Alzantot, Moustafa
add a person with the name Alzantot, Moustafa
 

Other publications of authors with the same name

Learning and Reasoning in Complex Coalition Information Environments: A Critical Analysis., , , , , , , , , and 3 other author(s). FUSION, page 1-8. IEEE, (2018)CAAD 2018: Generating Transferable Adversarial Examples., , and . CoRR, (2018)SenseGen: A Deep Learning Architecture for Synthetic Sensor Data Generation., , and . CoRR, (2017)NeuroMask: Explaining Predictions of Deep Neural Networks through Mask Learning., , , and . SMARTCOMP, page 81-86. IEEE, (2019)JustWalk: A Crowdsourcing Approach for the Automatic Construction of Indoor Floorplans., , and . IEEE Trans. Mob. Comput., 18 (10): 2358-2371 (2019)VindiCo: Privacy Safeguard Against Adaptation Based Spyware in Human-in-the-Loop IoT., , , , and . CoRR, (2022)Demonstrating CrowdInside: A system for the automatic construction of indoor floor-plans., and . PerCom Workshops, page 321-323. IEEE Computer Society, (2013)GenAttack: practical black-box attacks with gradient-free optimization., , , , , and . GECCO, page 1111-1119. ACM, (2019)SpyCon: Adaptation Based Spyware in Human-in-the-Loop IoT., , , , and . IEEE Symposium on Security and Privacy Workshops, page 163-168. IEEE, (2019)DEMO Classroom7: Please, Make Sure Your Phones Are Switched On!, , and . MobiQuitous, volume 104 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 243-247. Springer, (2011)