Tamas Abraham

Orcid: 0000-0003-2466-7646

According to our database1, Tamas Abraham authored at least 22 papers between 1998 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Erasing Undesirable Concepts in Diffusion Models with Adversarial Preservation.
CoRR, 2024

On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World.
CoRR, 2024

Removing Undesirable Concepts in Text-to-Image Generative Models with Learnable Prompts.
CoRR, 2024

EaTVul: ChatGPT-based Evasion Attack Against Software Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Bayesian Learned Models Can Detect Adversarial Malware for Free.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Transferable Graph Backdoor Attack.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Local Intrinsic Dimensionality Signals Adversarial Perturbations.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

2021
Closing the BIG-LID: An Effective Local Intrinsic Dimensionality Defense for Nonlinear Regression Poisoning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Towards Understanding Pixel Vulnerability under Adversarial Attacks for Images.
CoRR, 2020

Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Improving Adversarial Robustness by Enforcing Local and Global Compactness.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions.
CoRR, 2019

Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
CoRR, 2019

2018
Reinforcement Learning for Autonomous Defence in Software-Defined Networking.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

2006
Event sequence mining to develop profiles for computer forensic investigation purposes.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

2002
Investigative Profiling with Computer Forensic Log Data and Association Rules.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

Investigative Profile Analysis With Computer Forensic Log Data Using Attribute Generalisation.
Proceedings of the 15th Australian Joint Conference on Artificial Intelligence 2002, 2002

1999
Survey of Spatio-Temporal Databases.
GeoInformatica, 1999

1998
Opportunities for Knowledge Discovery in Spatio-Temporal Information Systems.
Australas. J. Inf. Syst., 1998

Incremental Meta-Mining from Large Temporal Data Sets.
Proceedings of the Advances in Database Technologies, 1998


  Loading...