Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Chain-of-Thought: Augmenting Large Language Models by Reasoning on Graphs., , , , , , , , , and 1 other author(s). ACL (Findings), page 163-184. Association for Computational Linguistics, (2024)FedSelect: Personalized Federated Learning with Customized Selection of Parameters for Fine-Tuning., , , , , and . CVPR, page 23985-23994. IEEE, (2024)Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions., , , , , and . CoRR, (2022)Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?, , , , , , , , and . CoRR, (2023)FedMLSecurity: A Benchmark for Attacks and Defenses in Federated Learning and LLMs., , , , , , , , , and 3 other author(s). CoRR, (2023)FOCUS: Fairness via Agent-Awareness for Federated Learning on Heterogeneous Data., , , , , , and . CoRR, (2022)Effective and Efficient Federated Tree Learning on Hybrid Data., , , , , , , and . ICLR, OpenReview.net, (2024)LLM-PBE: Assessing Data Privacy in Large Language Models., , , , , , , , , and 3 other author(s). Proc. VLDB Endow., 17 (11): 3201-3214 (July 2024)Uncovering the Connection Between Differential Privacy and Certified Robustness of Federated Learning against Poisoning Attacks., , , and . CoRR, (2022)Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses., , , , , , , , and . CoRR, (2020)