Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transformer-Boosted Anomaly Detection with Fuzzy Hashes., , , and . CoRR, (2022)Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks., , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 20522-20545. PMLR, (2022)Rickrolling the Artist: Injecting Backdoors into Text Encoders for Text-to-Image Synthesis., , and . ICCV, page 4561-4573. IEEE, (2023)The Biased Artist: Exploiting Cultural Biases via Homoglyphs in Text-Guided Image Generation Models., , and . CoRR, (2022)Does CLIP Know My Face?, , , , , and . J. Artif. Intell. Res., (2024)Defending Our Privacy With Backdoors., , , and . CoRR, (2023)Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash., , , and . FAccT, page 58-69. ACM, (2022)Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks., , and . ICLR, OpenReview.net, (2024)To Trust or Not To Trust Prediction Scores for Membership Inference Attacks., , and . IJCAI, page 3043-3049. ijcai.org, (2022)Fair Diffusion: Instructing Text-to-Image Generation Models on Fairness., , , , , , and . CoRR, (2023)