Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning., , , and . CoRR, (2023)PermPress: Machine Learning-Based Pipeline to Evaluate Permissions in App Privacy Policies., , , , , , and . IEEE Access, (2022)Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems., , , , , , , and . CoRR, (2022)Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds., , , and . CoRR, (2022)Towards Measuring Membership Privacy., , and . CoRR, (2017)Generative Models for Security: Attacks, Defenses, and Opportunities., and . CoRR, (2021)Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems., , , and . ICLR, OpenReview.net, (2022)A Pragmatic Approach to Membership Inferences on Machine Learning Models., , , , , , , and . EuroS&P, page 521-534. IEEE, (2020)Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting., , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 588-614. Springer, (2015)Privacy through Fake yet Semantically Real Traces., and . CoRR, (2015)