Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Markpainting: Adversarial Machine Learning meets Inpainting., , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 5409-5419. PMLR, (2021)Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras., , , , , , and . Internet Measurement Conference, page 551-566. ACM, (2020)Measuring memorization in RLHF for code completion., , , and . CoRR, (2024)Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD., , , , and . USENIX Security Symposium, USENIX Association, (2024)UnUnlearning: Unlearning is not sufficient for content regulation in advanced generative AI., , , , , , , , and . CoRR, (2024)AI models collapse when trained on recursively generated data., , , , , and . Nat., 631 (8022): 755-759 (July 2024)Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems., , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 7102-7121. PMLR, (2022)Manipulating SGD with Data Ordering Attacks., , , , , , and . NeurIPS, page 18021-18032. (2021)When the Curious Abandon Honesty: Federated Learning Is Not Private., , , , , and . EuroS&P, page 175-199. IEEE, (2023)On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning., , , and . USENIX Security Symposium, page 4007-4022. USENIX Association, (2022)