Search

Your search keyword '"Kesidis, George"' showing total 704 results

Search Constraints

Start Over You searched for: Author "Kesidis, George" Remove constraint Author: "Kesidis, George"
704 results on '"Kesidis, George"'

Search Results

1. XRFlux: Virtual Reality Benchmark for Edge Caching Systems

2. Ten Ways in which Virtual Reality Differs from Video Streaming

3. A Study of Backdoors in Instruction Fine-tuned Language Models

5. Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks

6. GPU Cluster Scheduling for Network-Sensitive Deep Learning

7. Post-Training Overfitting Mitigation in DNN Classifiers

8. Temporal-Distributed Backdoor Attack Against Video Based Action Recognition

9. Backdoor Mitigation by Correcting the Distribution of Neural Activations

10. Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection

11. Analysis of Distributed Deep Learning in the Cloud

13. Cluster Resource Management for Dynamic Workloads by Online Optimization

14. MM-BD: Post-Training Detection of Backdoor Attacks with Arbitrary Backdoor Pattern Types Using a Maximum Margin Statistic

15. Post-Training Detection of Backdoor Attacks for Two-Class and Multi-Attack Scenarios

16. Test-Time Detection of Backdoor Triggers for Poisoned Deep Neural Networks

17. Detecting Backdoor Attacks Against Point Cloud Classifiers

18. Backdoor Attack and Defense for Deep Regression

19. Robust and Active Learning for Deep Neural Network Regression

20. Age of Information for Small Buffer Systems

21. A BIC-based Mixture Model Defense against Data Poisoning Attacks on Classifiers

22. Anomaly Detection of Adversarial Examples using Class-conditional Generative Adversarial Networks

23. Age of information distribution under dynamic service preemption

24. Age of information without service preemption

25. A Backdoor Attack against 3D Point Cloud Classifiers

26. L-RED: Efficient Post-Training Detection of Imperceptible Backdoor Attacks without Access to the Training Set

27. Reverse Engineering Imperceptible Backdoor Attacks on Deep Neural Networks for Detection and Training Set Cleansing

28. CASH: A Credit Aware Scheduling for Public Cloud Platforms

32. Revealing Perceptible Backdoors, without the Training Set, via the Maximum Achievable Misclassification Fraction Statistic

33. Notes on Margin Training and Margin p-Values for Deep Neural Network Classifiers

34. Detection of Backdoors in Trained Classifiers Without Access to the Training Set

35. On a caching system with object sharing

36. Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks

37. The distribution of age-of-information performance measures for message processing systems

38. Overbooking Microservices in the Cloud

40. When Not to Classify: Detection of Reverse Engineering Attacks on DNN Image Classifiers

41. A Mixture Model Based Defense for Data Poisoning Attacks Against Naive Bayes Spam Filters

42. Heterogeneous MacroTasking (HeMT) for Parallel Processing in the Public Cloud

43. Relative Age of Information: Maintaining Freshness while Considering the Most Recently Generated Information

44. Online Scheduling of Spark Workloads with Mesos using Different Fair Allocation Algorithms

45. An Efficient and Fair Multi-Resource Allocation Mechanism for Heterogeneous Servers

46. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time

47. Moving-target Defense against Botnet Reconnaissance and an Adversarial Coupon-Collection Model

48. Is Non-Neutrality Profitable for the Stakeholders of the Internet Market? - Part II

49. Adversarial Learning: A Critical Review and Active Learning Study

50. Scheduling Distributed Resources in Heterogeneous Private Clouds

Catalog

Books, media, physical & digital resources