George Kesidis
Penn State University
H-index: 48
North America-United States
Top articles of George Kesidis
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Temporal-distributed backdoor attack against video based action recognition | AAAI 2024 | Xi* Li Songhe* Wang Ruiquan Huang Mahanth Gowda George Kesidis | 2023/8/21 |
BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers: A Comprehensive Study | IEEE Transactions on Knowledge and Data Engineering | Xi Li David J Miller Zhen Xiang George Kesidis | 2024/2/13 |
Universal Post-Training Reverse-Engineering Defense Against Backdoors in Deep Neural Networks | arXiv preprint arXiv:2402.02034 | Xi Li Hang Wang David J Miller George Kesidis | 2024/2/3 |
GPU Cluster Scheduling for Network-Sensitive Deep Learning | arXiv preprint arXiv:2401.16492 | Aakash Sharma Vivek M Bhasi Sonali Singh George Kesidis Mahmut T Kandemir | 2024/1/29 |
Post-training detection and identification of human-imperceptible backdoor-poisoning attacks | 2023/3/21 | ||
Backdoor Mitigation by Correcting the Distribution of Neural Activations | arXiv preprint arXiv:2308.09850 | Xi Li Zhen Xiang David J Miller George Kesidis | 2023/8/18 |
Mm-bd: Post-training detection of backdoor attacks with arbitrary backdoor pattern types using a maximum margin statistic | Hang Wang Zhen Xiang David J Miller George Kesidis | 2024 | |
Age of information using Markov-renewal methods | Queueing Systems | George Kesidis Takis Konstantopoulos Michael A Zazanis | 2023/2 |
Improved Activation Clipping for Universal Backdoor Mitigation and Test-Time Detection | arXiv preprint arXiv:2308.04617 | Hang Wang Zhen Xiang David J Miller George Kesidis | 2023/8/8 |
Post-Training Overfitting Mitigation in DNN Classifiers | arXiv preprint arXiv:2309.16827 | Hang Wang David J Miller George Kesidis | 2023/9/28 |
Anomaly detection of adversarial examples using class-conditional generative adversarial networks | Computers & Security | Hang Wang David J Miller George Kesidis | 2023/1/1 |
Stash: A comprehensive stall-centric characterization of public cloud VMs for distributed deep learning | Aakash Sharma Vivek M Bhasi Sonali Singh Rishabh Jain Jashwant Raj Gunasekaran | 2023/7/18 | |
A BIC-Based Mixture Model Defense Against Data Poisoning Attacks on Classifiers | Xi Li David J Miller Zhen Xiang George Kesidis | 2023/9/17 | |
Post-training detection and identification of backdoor-poisoning attacks | 2023/7/18 | ||
Anomaly-Detection Defense Against Test-Time Evasion Attacks on Robust DNNs | Ye Tao Zhen Xiang David J Miller George Kesidis | 2023/9/6 | |
Training set cleansing of backdoor poisoning by self-supervised representation learning | Hang Wang Sahar Karami Ousmane Dia Hippolyt Ritter Ehsan Emamjomeh-Zadeh | 2023/6/4 | |
Adversarial Learning and Secure AI | David J Miller Zhen Xiang George Kesidis | 2023/8/31 | |
Container Sizing for Microservices with Dynamic Workload by Online Optimization | Nader Alfares George Kesidis | 2023/12/11 | |
Splice: An automated framework for cost-and performance-aware blending of cloud services | Myungjun Son Shruti Mohanty Jashwant Raj Gunasekaran Aman Jain Mahmut Taylan Kandemir | 2022/5/16 | |
Backdoor Mitigation by Correcting Activation Distribution Alteration | Xi Li Zhen Xiang George Kesidis Bo Li David J Miller | 2022/9/29 |