Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transformer-Boosted Anomaly Detection with Fuzzy Hashes., , , and . CoRR, (2022)The Biased Artist: Exploiting Cultural Biases via Homoglyphs in Text-Guided Image Generation Models., , and . CoRR, (2022)Rickrolling the Artist: Injecting Backdoors into Text Encoders for Text-to-Image Synthesis., , and . ICCV, page 4561-4573. IEEE, (2023)Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash., , , and . FAccT, page 58-69. ACM, (2022)To Trust or Not To Trust Prediction Scores for Membership Inference Attacks., , and . IJCAI, page 3043-3049. ijcai.org, (2022)Defending Our Privacy With Backdoors., , , and . CoRR, (2023)Sparsely-gated Mixture-of-Expert Layers for CNN Interpretability., , , and . IJCNN, page 1-10. IEEE, (2023)Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks., , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 20522-20545. PMLR, (2022)CLIPping Privacy: Identity Inference Attacks on Multi-Modal Machine Learning Models., , and . CoRR, (2022)Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks., , and . CoRR, (2023)