Tamas Abraham
Orcid: 0000-0003-2466-7646
According to our database1,
Tamas Abraham
authored at least 22 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World.
CoRR, 2024
Removing Undesirable Concepts in Text-to-Image Generative Models with Learnable Prompts.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Proceedings of the 61st IEEE Conference on Decision and Control, 2022
2021
Closing the BIG-LID: An Effective Local Intrinsic Dimensionality Defense for Nonlinear Regression Poisoning.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Improving Ensemble Robustness by Collaboratively Promoting and Demoting Adversarial Robustness.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
CoRR, 2020
Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
2019
Perturbations are not Enough: Generating Adversarial Examples with Spatial Distortions.
CoRR, 2019
Adversarial Reinforcement Learning under Partial Observability in Software-Defined Networking.
CoRR, 2019
2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
2006
Event sequence mining to develop profiles for computer forensic investigation purposes.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
2002
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002
Investigative Profile Analysis With Computer Forensic Log Data Using Attribute Generalisation.
Proceedings of the 15th Australian Joint Conference on Artificial Intelligence 2002, 2002
1999
1998
Australas. J. Inf. Syst., 1998
Proceedings of the Advances in Database Technologies, 1998