On the Adversarial Vulnerabilities of Transfer Learning in Remote SensingIEEE Transactions on Geoscience and Remote Sensing (IEEE TGRS), 2025 |
Constructing Adversarial Examples for Vertical Federated Learning:
Optimal Client Corruption through Multi-Armed BanditInternational Conference on Learning Representations (ICLR), 2024 |
Counter-Samples: A Stateless Strategy to Neutralize Black Box
Adversarial AttacksACM Transactions on Intelligent Systems and Technology (ACM TIST), 2024 |
Algorithmic audits of algorithms, and the lawAI and Ethics (AE), 2022 |