Search

Your search keyword '"Kesidis, George"' showing total 22 results

Search Constraints

Start Over You searched for: Author "Kesidis, George" Remove constraint Author: "Kesidis, George" Topic computer science - cryptography and security Remove constraint Topic: computer science - cryptography and security
22 results on '"Kesidis, George"'

Search Results

1. A Study of Backdoors in Instruction Fine-tuned Language Models

2. Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks

3. Temporal-Distributed Backdoor Attack Against Video Based Action Recognition

4. Backdoor Mitigation by Correcting the Distribution of Neural Activations

5. Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection

6. MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic

7. Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios

8. Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks

9. Detecting Backdoor Attacks Against Point Cloud Classifiers

10. Backdoor Attack and Defense for Deep Regression

11. A BIC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers

12. A Backdoor Attack against 3D Point Cloud Classifiers

13. Detection of Backdoors in Trained Classifiers Without Access to the Training Set

14. Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks

15. A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters

16. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time

17. Moving-target Defense against Botnet Reconnaissance and an Adversarial Coupon-Collection Model

18. Adversarial Learning: A Critical Review and Active Learning Study

19. Numerical Evaluation of Cloud-Side Shuffling Defenses against DDoS Attacks on Proxied Multiserver Systems

20. Detecting Clusters of Anomalies on Low-Dimensional Feature Subsets with Application to Network Traffic Flow Data

21. Detecting Backdoor Attacks against Point Cloud Classifiers

22. Universal Post-Training Backdoor Detection

Catalog

Books, media, physical & digital resources