Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch., , , , and . CoRR, (2021)Fishing for User Data in Large-Batch Federated Learning via Gradient Magnification., , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 23668-23684. PMLR, (2022)Exploring Sequence-to-Sequence Transformer-Transducer Models for Keyword Spotting., , , , , and . CoRR, (2022)Witches' Brew: Industrial Scale Data Poisoning via Gradient Matching., , , , , , and . CoRR, (2020)Exploring Sequence-to-Sequence Transformer-Transducer Models for Keyword Spotting., , , , , and . ICASSP, page 1-5. IEEE, (2023)Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch., , , , and . NeurIPS, (2022)Deep k-NN Defense Against Clean-Label Data Poisoning Attacks., , , , , , , and . ECCV Workshops (1), volume 12535 of Lecture Notes in Computer Science, page 55-70. Springer, (2020)Understanding Generalization Through Visualizations., , , , , , and . ICBINB@NeurIPS, volume 137 of Proceedings of Machine Learning Research, page 87-97. PMLR, (2020)What Doesn't Kill You Makes You Robust(er): Adversarial Training against Poisons and Backdoors., , , , , and . CoRR, (2021)Preventing Unauthorized Use of Proprietary Data: Poisoning for Secure Dataset Release., , , , , , and . CoRR, (2021)