Author of the publication

Tight Auditing of Differentially Private Machine Learning.

, , , , , , , and . USENIX Security Symposium, page 1631-1648. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poisoning and Backdooring Contrastive Learning., and . CoRR, (2021)Poster: HealthOS: a platform for integrating and developing pervasive healthcare applications., , and . MobiSys, page 409-410. ACM, (2011)On the impact of dynamic addressing on malware propagation., , and . WORM, page 51-56. ACM Press, (2006)Accelerated corrective consensus: Converge to the exact average at a faster rate., , , and . ACC, page 3417-3422. IEEE, (2011)Corrective consensus with asymmetric wireless links., , , and . CDC/ECC, page 6660-6665. IEEE, (2011)On the use of anycast in DNS., , and . SIGMETRICS, page 394-395. ACM, (2005)Wireless Sensor Network for in situ Soil Moisture Monitoring., , , , , , , , , and 3 other author(s). SENSORNETS, page 25-36. SCITEPRESS, (2021)Network-Aware Join Processing in Global-Scale Database Federations., , , and . ICDE, page 586-595. IEEE Computer Society, (2008)Typhoon: A Reliable Data Dissemination Protocol for Wireless Sensor Networks., , and . EWSN, volume 4913 of Lecture Notes in Computer Science, page 268-285. Springer, (2008)Wireless sensor networks for soil science., , , , , , , , , and . Int. J. Sens. Networks, 7 (1/2): 53-70 (2010)