Author of the publication

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking.

, , , , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of a Sheet-Based Material Handling System for Layered Manufacturing., , and . ICRA, page 1352-1357. IEEE, (2001)Practical Control Flow Integrity and Randomization for Binary Executables., , , , , , , and . IEEE Symposium on Security and Privacy, page 559-573. IEEE Computer Society, (2013)SoK: Eternal War in Memory., , , and . IEEE Symposium on Security and Privacy, page 48-62. IEEE Computer Society, (2013)Structuring 2-way Branches in Binary Executables., , , and . COMPSAC (1), page 115-118. IEEE Computer Society, (2007)Field experience with obfuscating million-user iOS apps in large enterprise mobile development., , , and . Softw., Pract. Exper., 49 (2): 252-273 (2019)A Flexible Fringe Projection Vision System with Extended Mathematical Model for Accurate Three-Dimensional Measurement., , and . Sensors, 16 (5): 612 (2016)An Efficient Direction Field-Based Method for the Detection of Fasteners on High-Speed Railways., , , , , and . Sensors, 11 (8): 7364-7381 (2011)Barycentric coordinates based soft assignment for object classification., , and . ICME Workshops, page 1-6. IEEE Computer Society, (2016)Incorporating Intelligence in Fog Computing for Big Data Analysis in Smart Cities., , , , , , and . IEEE Trans. Industrial Informatics, 13 (5): 2140-2150 (2017)Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity., , , , and . IEEE Access, (2017)