Tomás Pevný
Orcid: 0000-0002-5768-9713
According to our database1,
Tomás Pevný
authored at least 98 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Mach. Learn., July, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
CoRR, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel Scenarios.
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Proceedings of the Progress in Artificial Intelligence, 2023
2022
IEEE Trans. Neural Networks Learn. Syst., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Optim. Methods Softw., 2022
JsonGrinder.jl: automated differentiable neural architecture for embedding arbitrary JSON data.
J. Mach. Learn. Res., 2022
CoRR, 2022
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Heuristic Search Planning with Deep Neural Networks using Imitation, Attention and Curriculum Learning.
CoRR, 2021
Mill.jl and JsonGrinder.jl: automated differentiable feature extraction for learning from raw JSON data.
CoRR, 2021
Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks.
CoRR, 2021
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
When Should You Defend Your Classifier? - - A Game-Theoretical Analysis of Countermeasures Against Adversarial Examples.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021
2020
Mach. Learn., 2020
CoRR, 2020
Sum-Product-Transform Networks: Exploiting Symmetries using Invertible Transformations.
Proceedings of the International Conference on Probabilistic Graphical Models, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 20th Conference Information Technologies, 2020
2019
Deep Reinforcement Learning with Explicitly Represented Knowledge and Variable State and Action Spaces.
CoRR, 2019
Approximation capability of neural networks on spaces of probability measures and tree-structured domains.
CoRR, 2019
Proceedings of the ACM Workshop on Information Hiding and Multimedia Security, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Algorithms for solving optimization problems arising from deep neural net models: nonsmooth problems.
CoRR, 2018
Algorithms for solving optimization problems arising from deep neural net models: smooth problems.
CoRR, 2018
Proceedings of the 6th ACM Workshop on Information Hiding and Multimedia Security, 2018
2017
Reducing false positives of network anomaly detection by local adaptive multivariate smoothing.
J. Comput. Syst. Sci., 2017
Proceedings of the 2017 IEEE Security and Privacy Workshops, 2017
Proceedings of the Similarity Search and Applications - 10th International Conference, 2017
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017
Proceedings of the Advances in Neural Networks - ISNN 2017 - 14th International Symposium, 2017
Optimal Strategies for Detecting Data Exfiltration by Internal and External Attackers.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
2016
IEEE Intell. Syst., 2016
Comput. Networks, 2016
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016
Proceedings of the Similarity Search and Applications - 9th International Conference, 2016
Proceedings of the Intelligence and Security Informatics - 11th Pacific Asia Workshop, 2016
Proceedings of the 4th ACM Workshop on Information Hiding and Multimedia Security, 2016
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the 2015 IEEE International Workshop on Information Forensics and Security, 2015
Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, 2015
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014
Proceedings of the Media Watermarking, 2014
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2014
2013
Proceedings of the Media Watermarking, 2013
Proceedings of the ACM Information Hiding and Multimedia Security Workshop, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
2012
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012
Proceedings of the Multimedia and Security Workshop, 2012
Proceedings of the Media Watermarking, 2012
Proceedings of the Media Watermarking, 2012
2011
Proceedings of the Media Watermarking, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
2010
IEEE Trans. Inf. Forensics Secur., 2010
Proceedings of the Media Forensics and Security II, 2010
Proceedings of the Information Hiding - 12th International Conference, 2010
2008
IEEE Trans. Inf. Forensics Secur., 2008
IEEE Trans. Inf. Forensics Secur., 2008
Estimation of primary quantization matrix for steganalysis of double-compressed JPEG images.
Proceedings of the Security, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the 10th workshop on Multimedia & Security, 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
2007
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007
Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.
Proceedings of the 9th workshop on Multimedia & Security, 2007
2006
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006
2005
Proceedings of the Digital Watermarking, 4th International Workshop, 2005