From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets., , , , , , и . CCS, стр. 2606-2620. ACM, (2023)"Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World., , , , , , и . CCS, стр. 235-251. ACM, (2021)Data Isotopes for Data Provenance in DNNs., , , и . CoRR, (2022)Fawkes: Protecting Privacy against Unauthorized Deep Learning Models., , , , , и . USENIX Security Symposium, стр. 1589-1604. USENIX Association, (2020)Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models., , , , , и . USENIX Security Symposium, стр. 2187-2204. USENIX Association, (2023)Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models., , , , , и . CoRR, (2020)Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks., , , , , и . CCS, стр. 67-83. ACM, (2020)Backdoor Attacks Against Deep Learning Systems in the Physical World., , , , , и . CVPR, стр. 6206-6215. Computer Vision Foundation / IEEE, (2021)The Cool and the Cruel: Separating Hard Parts of LWE Secrets., , , , , , и . AFRICACRYPT, том 14861 из Lecture Notes in Computer Science, стр. 428-453. Springer, (2024)SoK: Anti-Facial Recognition Technology., , , и . SP, стр. 864-881. IEEE, (2023)