default search action
Salah Ghamizi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i17]Salah Ghamizi, Jun Cao, Aoxiang Ma, Pedro Rodriguez:
PowerFlowMultiNet: Multigraph Neural Networks for Unbalanced Three-Phase Distribution Systems. CoRR abs/2403.00892 (2024) - [i16]Thibault Simonetto, Salah Ghamizi, Maxime Cordy:
Constrained Adaptive Attack: Effective Adversarial Attack Against Deep Neural Networks for Tabular Data. CoRR abs/2406.00775 (2024) - [i15]Pantelis Dogoulis, Matthieu Jimenez, Salah Ghamizi, Maxime Cordy, Yves Le Traon:
Robustness Analysis of AI Models in Critical Energy Systems. CoRR abs/2406.14361 (2024) - [i14]Salah Ghamizi, Aleksandar Bojchevski, Aoxiang Ma, Jun Cao:
SafePowerGraph: Safety-aware Evaluation of Graph Neural Networks for Transmission Power Grids. CoRR abs/2407.12421 (2024) - [i13]Thibault Simonetto, Salah Ghamizi, Maxime Cordy:
TabularBench: Benchmarking Adversarial Robustness for Tabular Deep Learning in Real-world Use-cases. CoRR abs/2408.07579 (2024) - 2023
- [c12]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
On Evaluating Adversarial Robustness of Chest X-ray Classification. SafeAI@AAAI 2023 - [c11]Salijona Dyrmishi, Salah Ghamizi, Maxime Cordy:
How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks. ACL (1) 2023: 8822-8836 - [c10]Salah Ghamizi, Jingfeng Zhang, Maxime Cordy, Mike Papadakis, Masashi Sugiyama, Yves Le Traon:
GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks. ICML 2023: 11255-11282 - [c9]Salijona Dyrmishi, Salah Ghamizi, Thibault Simonetto, Yves Le Traon, Maxime Cordy:
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks. SP 2023: 1384-1400 - [i12]Salah Ghamizi, Jingfeng Zhang, Maxime Cordy, Mike Papadakis, Masashi Sugiyama, Yves Le Traon:
GAT: Guided Adversarial Training with Pareto-optimal Auxiliary Tasks. CoRR abs/2302.02907 (2023) - [i11]Salijona Dyrmishi, Salah Ghamizi, Maxime Cordy:
How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks. CoRR abs/2305.15587 (2023) - [i10]Salah Ghamizi, Maxime Cordy, Yuejun Guo, Mike Papadakis, Yves Le Traon:
Hazards in Deep Learning Testing: Prevalence, Impact and Recommendations. CoRR abs/2309.05381 (2023) - [i9]Thibault Simonetto, Salah Ghamizi, Antoine Desjardins, Maxime Cordy, Yves Le Traon:
Constrained Adaptive Attacks: Realistic Evaluation of Adversarial Examples and Robust Training of Deep Neural Networks for Tabular Data. CoRR abs/2311.04503 (2023) - 2022
- [b1]Salah Ghamizi:
Multi-objective Robust Machine Learning For Critical Systems With Scarce Data. University of Luxembourg, 2022 - [c8]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Adversarial Robustness in Multi-Task Learning: Promises and Illusions. AAAI 2022: 697-705 - [c7]Thibault Simonetto, Salijona Dyrmishi, Salah Ghamizi, Maxime Cordy, Yves Le Traon:
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space. IJCAI 2022: 1313-1319 - [i8]Salijona Dyrmishi, Salah Ghamizi, Thibault Simonetto, Yves Le Traon, Maxime Cordy:
On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Adversarial Attacks. CoRR abs/2202.03277 (2022) - [i7]Salah Ghamizi, Maxime Cordy, Michail Papadakis, Yves Le Traon:
On Evaluating Adversarial Robustness of Chest X-ray Classification: Pitfalls and Best Practices. CoRR abs/2212.08130 (2022) - 2021
- [c6]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Evasion Attack STeganography: Turning Vulnerability Of Machine Learning To Adversarial Attacks Into A Real-world Application. ICCVW 2021: 31-40 - [i6]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Adversarial Robustness in Multi-Task Learning: Promises and Illusions. CoRR abs/2110.15053 (2021) - [i5]Thibault Simonetto, Salijona Dyrmishi, Salah Ghamizi, Maxime Cordy, Yves Le Traon:
A Unified Framework for Adversarial Attack and Defense in Constrained Feature Space. CoRR abs/2112.01156 (2021) - [i4]Lisa Veiber, Salah Ghamizi, Jean-Sébastien Sottet:
A Hybrid Predictive Model for Mitigating Health and Economic Factors during a Pandemic. ERCIM News 2021(124) (2021) - 2020
- [c5]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
FeatureNET: diversity-driven generation of deep learning models. ICSE (Companion Volume) 2020: 41-44 - [c4]Salah Ghamizi, Renaud Rwemalika, Maxime Cordy, Lisa Veiber, Tegawendé F. Bissyandé, Mike Papadakis, Jacques Klein, Yves Le Traon:
Data-driven Simulation and Optimization for Covid-19 Exit Strategies. KDD 2020: 3434-3442 - [c3]Salah Ghamizi, Maxime Cordy, Martin Gubri, Mike Papadakis, Andrey Boytsov, Yves Le Traon, Anne Goujon:
Search-based adversarial testing and improvement of constrained credit scoring systems. ESEC/SIGSOFT FSE 2020: 1089-1100 - [i3]Salah Ghamizi, Renaud Rwemalika, Lisa Veiber, Maxime Cordy, Tegawendé F. Bissyandé, Mike Papadakis, Jacques Klein, Yves Le Traon:
Data-driven Simulation and Optimization for Covid-19 Exit Strategies. CoRR abs/2006.07087 (2020)
2010 – 2019
- 2019
- [c2]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Automated search for configurations of convolutional neural network architectures. SPLC (A) 2019: 21:1-21:12 - [i2]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Automated Search for Configurations of Deep Neural Network Architectures. CoRR abs/1904.04612 (2019) - [i1]Salah Ghamizi, Maxime Cordy, Mike Papadakis, Yves Le Traon:
Adversarial Embedding: A robust and elusive Steganography and Watermarking technique. CoRR abs/1912.01487 (2019) - 2015
- [c1]Bart Lamiroy, Thomas Bouville, Julien Blégean, Hongliu Cao, Salah Ghamizi, Romain Houpin, Matthias Lloyd:
Re-typograph phase I: a proof-of-concept for typeface parameter extraction from historical documents. DRR 2015: 94020B
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-25 01:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint