Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Smaller Language Models are Better Black-box Machine-Generated Text Detectors., , , , and . CoRR, (2023)Quantifizierung und Schutz von Location Privacy.. Ausgezeichnete Informatikdissertationen, volume D-14 of LNI, GI, (2013)A practical secure neighbor verification protocol for wireless sensor networks., , , , and . WISEC, page 193-200. ACM, (2009)Collaborative Location Privacy with Rational Users., , , and . GameSec, volume 7037 of Lecture Notes in Computer Science, page 163-181. Springer, (2011)Membership Inference Attacks Against Adversarially Robust Deep Learning Models., , and . IEEE Symposium on Security and Privacy Workshops, page 50-56. IEEE, (2019)On the Privacy Risks of Algorithmic Fairness., and . CoRR, (2020)Machine Learning with Membership Privacy using Adversarial Regularization., , and . ACM Conference on Computer and Communications Security, page 634-646. ACM, (2018)SOTERIA: In Search of Efficient Neural Networks for Private Inference., , , and . CoRR, (2020)Hiding in the Mobile Crowd: LocationPrivacy through Collaboration., , , , and . IEEE Trans. Dependable Secur. Comput., 11 (3): 266-279 (2014)Preserving privacy in collaborative filtering through distributed aggregation of offline profiles., , , and . RecSys, page 157-164. ACM, (2009)