Kathrin Grosse

Orcid: 0000-0002-5401-4171

Affiliations:
  • EPFL, Lausanne, Switzerland
  • University of Cagliari, PRALab, Italy (former)
  • CISPA Helmholtz Center for Information Security, Saarbrücken, Germany (former)
  • Saarland University, Saarbrücken, Germany (former, PhD 2021)
  • University of Osnabrück, Institute of Cognitive Science, Germany (former)


According to our database1, Kathrin Grosse authored at least 34 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Machine Learning Security Against Data Poisoning: Are We There Yet?
Computer, March, 2024

Rethinking data augmentation for adversarial robustness.
Inf. Sci., January, 2024

Testing autonomous vehicles and AI: perspectives and challenges from cybersecurity, transparency, robustness and fairness.
CoRR, 2024

Voices from the Frontline: Revealing the AI Practitioners' viewpoint on the European AI Act.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

When Your AI Becomes a Target: AI Security Incidents and Best Practices.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Adversarial vulnerability bounds for Gaussian process classification.
Mach. Learn., March, 2023

Machine Learning Security in Industry: A Quantitative Survey.
IEEE Trans. Inf. Forensics Secur., 2023

Wild Patterns Reloaded: A Survey of Machine Learning Security against Training Data Poisoning.
ACM Comput. Surv., 2023

Manipulating Trajectory Prediction with Backdoors.
CoRR, 2023

Towards more Practical Threat Models in Artificial Intelligence Security.
CoRR, 2023

2022
A Survey on Reinforcement Learning Security with Application to Autonomous Driving.
CoRR, 2022

"Why do so?" - A Practical Perspective on Machine Learning Security.
CoRR, 2022

Backdoor smoothing: Demystifying backdoor attacks on deep neural networks.
Comput. Secur., 2022

Industrial practitioners' mental models of adversarial machine learning.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

2021
Backdoor Learning Curves: Explaining Backdoor Poisoning Beyond Influence Functions.
CoRR, 2021

Mental Models of Adversarial Machine Learning.
CoRR, 2021

Do winning tickets exist before DNN training?
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021

2020
Why is Machine Learning Security so hard?
PhD thesis, 2020

Adversarial Examples and Metrics.
CoRR, 2020

How many winning tickets are there in one DNN?
CoRR, 2020

A new measure for overfitting and its implications for backdooring of deep learning.
CoRR, 2020

Killing Four Birds with one Gaussian Process: The Relation between different Test-Time Attacks.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

On the Security Relevance of Initial Weights in Deep Neural Networks.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

2019
Adversarial Initialization - when your network performs the way I want.
CoRR, 2019

2018
The Limitations of Model Uncertainty in Adversarial Settings.
CoRR, 2018

Killing Three Birds with one Gaussian Process: Analyzing Attack Vectors on Classification.
CoRR, 2018

2017
On the (Statistical) Detection of Adversarial Examples.
CoRR, 2017

Adversarial Examples for Malware Detection.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Adversarial Perturbations Against Deep Neural Networks for Malware Classification.
CoRR, 2016

2015
Integrating argumentation and sentiment analysis for mining opinions from Twitter.
AI Commun., 2015

2013
A First Approach to Mining Opinions as Multisets through Argumentation.
Proceedings of the Agreement Technologies - Second International Conference, 2013

2012
Empowering an E-Government Platform Through Twitter-Based Arguments.
Inteligencia Artif., 2012

An Argument-based Approach to Mining Opinions from Twitter.
Proceedings of the First International Conference on Agreement Technologies, 2012


  Loading...