Search

Your search keyword '"A. Apruzzese"' showing total 1,223 results

Search Constraints

Start Over You searched for: Author "A. Apruzzese" Remove constraint Author: "A. Apruzzese"
1,223 results on '"A. Apruzzese"'

Search Results

1. SoK: On the Offensive Potential of AI

2. Elephant in the Room: Dissecting and Reflecting on the Evolution of Online Social Network Research

3. LLM4PM: A case study on using Large Language Models for Process Modeling in Enterprise Organizations

4. Machine Learning in Space: Surveying the Robustness of on-board ML models to Radiation

5. 'Are Adversarial Phishing Webpages a Threat in Reality?' Understanding the Users' Perception of Adversarial Webpages

6. Longitudinal patterns and predictors of response to standard-of-care therapy in lupus nephritis: data from the Accelerating Medicines Partnership Lupus Network

7. Understanding the Process of Data Labeling in Cybersecurity

8. On Two Orderings of Lattice Paths

9. Urine proteomic signatures of histological class, activity, chronicity, and treatment response in lupus nephritis.

10. Attacking logo-based phishing website detectors with adversarial perturbations

11. Deconstruction of rheumatoid arthritis synovium defines inflammatory subtypes.

12. SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

13. A new indirect measurement method of the electron temperature for the Protosphera's pinch plasma

14. 'Real Attackers Don't Compute Gradients': Bridging the Gap Between Adversarial ML Research and Practice

15. Mitigating Adversarial Gray-Box Attacks Against Phishing Detectors

16. Cybersecurity in the Smart Grid: Practitioners' Perspective

17. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning

18. Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

23. Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations

25. Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

26. The Role of Machine Learning in Cybersecurity

27. DISTINCT PERIPHERAL IMMUNOPHENOTYPING UNDERLINES HISTOPATHOLOGICAL FEATURES IN PATIENTS WITH LUPUS NEPHRITIS IN A LARGE MULTI-CENTER COHORT

28. SoK: The Impact of Unlabelled Data in Cyberthreat Detection

29. Concept-based Adversarial Attacks: Tricking Humans and Classifiers Alike

30. The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

31. High incidence of proliferative and membranous nephritis in SLE patients with low proteinuria in the Accelerating Medicines Partnership.

34. Hypercapnia during transcatheter aortic valve replacement under monitored anaesthesia care: a retrospective cohort study

35. Urine Proteomics and Renal Single‐Cell Transcriptomics Implicate Interleukin‐16 in Lupus Nephritis

36. Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems

37. On the Evaluation of Sequential Machine Learning for Network Intrusion Detection

40. 1002 Single cell transcriptomics in kidney tissue from African American patients enrolled in the accelerating medicines partnership (AMP) implicates tubular cells in the pathogenesis of APOL1 associated lupus nephritis

41. 1012 Deep peripheral blood immunophenotyping identifies a subgroup of lupus nephritis patients characterized by high type 1 interferon signaling, persistent activated immune cells and poor renal response to standard of care at 1 year

42. 1009 In-depth analysis of myeloid cell subsets in lupus nephritis kidneys provides insights into disease mechanisms: lessons from the accelerating medicines partnership (AMP) in RA/SLE consortium

49. Safety of procuring research tissue during a clinically indicated kidney biopsy from patients with lupus: data from the Accelerating Medicines Partnership RA/SLE Network.

50. SoK: On the Offensive Potential of AI.

Catalog

Books, media, physical & digital resources