Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SoundLoc: Acoustic Method for Indoor Localization without Infrastructure., , and . CoRR, (2014)Learnability of Learning Performance and Its Application to Data Valuation., , and . CoRR, (2021)Algorithm of Thoughts: Enhancing Exploration of Ideas in Large Language Models., , , , , and . CoRR, (2023)Performance Scaling via Optimal Transport: Enabling Data Selection from Partially Revealed Sources., , , and . CoRR, (2023)An Empirical and Comparative Analysis of Data Valuation with Scalable Algorithms., , , , , and . CoRR, (2019)Who Leaked the Model? Tracking IP Infringers in Accountable Federated Learning., , , , , and . CoRR, (2023)A Safe Harbor for AI Evaluation and Red Teaming., , , , , , , , , and 13 other author(s). CoRR, (2024)PresenceSense: zero-training algorithm for individual presence detection based on power monitoring., , , , and . BuildSys@SenSys, page 1-10. ACM, (2014)Accountable Data Fusion and Privacy Preservation Techniques in Cyber-Physical Systems.. University of California, Berkeley, USA, (2018)base-search.net (ftcdlib:qt8kh6s51w).Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study., , , and . ICCV, page 4848-4858. IEEE, (2023)