From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches., , , , , , , и . CoRR, (2017)A Marauder's Map of Security and Privacy in Machine Learning.. CoRR, (2018)Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data., , , , и . ICLR, OpenReview.net, (2017)Machine Unlearning., , , , , , , и . CoRR, (2019)The Limitations of Deep Learning in Adversarial Settings., , , , , и . EuroS&P, стр. 372-387. IEEE, (2016)Sponge Examples: Energy-Latency Attacks on Neural Networks., , , , , и . EuroS&P, стр. 212-231. IEEE, (2021)Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation., , , , , и . EuroS&P, стр. 241-257. IEEE, (2023)Data-Free Model Extraction., , , и . CoRR, (2020)Robust and Actively Secure Serverless Collaborative Learning., , , , , , , , , и . CoRR, (2023)On the Fundamental Limits of Formally (Dis)Proving Robustness in Proof-of-Learning., , , , , , , и . CoRR, (2022)