Paul Montague
Orcid: 0000-0001-9461-7471
According to our database1,
Paul Montague
authored at least 47 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
CoRR, 2024
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World.
CoRR, 2024
Removing Undesirable Concepts in Text-to-Image Generative Models with Learnable Prompts.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Trans. Mach. Learn. Res., 2023
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Double Bubble, Toil and Trouble: Enhancing Certified Robustness through Transitivity.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
On Global-view Based Defense via Adversarial Attack and Defense Risk Guaranteed Bounds.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Understanding and Achieving Efficient Robustness with Adversarial Contrastive Learning.
CoRR, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
CoRR, 2020
Dual-Component Deep Domain Adaptation: A New Approach for Cross Project Software Vulnerability Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
2019
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions.
CoRR, 2019
Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
CoRR, 2019
Proceedings of the International Joint Conference on Neural Networks, 2019
Maximal Divergence Sequential Autoencoder for Binary Software Vulnerability Detection.
Proceedings of the 7th International Conference on Learning Representations, 2019
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2019: Text and Time Series, 2019
2018
IEEE Trans. Ind. Informatics, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
2017
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017
2012
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012
2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves.
Int. J. Inf. Sec., 2004
2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
1999
Proceedings of the Third International Conference on Knowledge-Based Intelligent Information Engineering Systems, 1999