Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fooling OCR Systems with Adversarial Text Images., and . CoRR, (2018)Training Large-Vocabulary Neural Language Models by Private Federated Learning for Resource-Constrained Devices., , , , , , , , , and 3 other author(s). CoRR, (2022)You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion., , , and . USENIX Security Symposium, page 1559-1575. USENIX Association, (2021)Membership Inference Attacks Against Machine Learning Models., , , and . IEEE Symposium on Security and Privacy, page 3-18. IEEE Computer Society, (2017)pfl-research: simulation framework for accelerating research in Private Federated Learning., , , , , , , , , and . CoRR, (2024)Learning Genomic Representations to Predict Clinical Outcomes in Cancer., , , and . CoRR, (2016)The Natural Auditor: How To Tell If Someone Used Your Words To Train Their Model., and . CoRR, (2018)Overlearning Reveals Sensitive Attributes., and . ICLR, OpenReview.net, (2020)Exploiting Unintended Feature Leakage in Collaborative Learning., , , and . IEEE Symposium on Security and Privacy, page 691-706. IEEE, (2019)FLAIR: Federated Learning Annotated Image Repository., , and . NeurIPS, (2022)