Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

JailbreakEval: An Integrated Toolkit for Evaluating Jailbreak Attempts Against Large Language Models., , , , , , and . CoRR, (2024)On the Influence of Twitter Trolls during the 2016 US Presidential Election., , , , and . CoRR, (2019)Cross-Site Prediction on Social Influence for Cold-Start Users in Online Social Networks., , , , , , and . WWW (Companion Volume), page 389. ACM, (2022)LBSLab: A User Data Collection System in Mobile Environments., , , , , , , , , and 1 other author(s). UbiComp/ISWC Adjunct, page 624-629. ACM, (2018)DeepScan: Exploiting Deep Learning for Malicious Account Detection in Location-Based Social Networks., , , , , , , and . IEEE Commun. Mag., 56 (11): 21-27 (2018)Unsafe Diffusion: On the Generation of Unsafe Images and Hateful Memes From Text-To-Image Models., , , , , and . CoRR, (2023)A Comprehensive Study of Privacy Risks in Curriculum Learning., , , , and . CoRR, (2023)Membership Inference Attack Against Masked Image Modeling., , , and . CoRR, (2024)A Hybrid Model Coupling Physical Constraints and Machine Learning to Estimate Daily Evapotranspiration in the Heihe River Basin., , , , , , , , , and 4 other author(s). Remote. Sens., 16 (12): 2143 (June 2024)Can't Steal? Cont-Steal! Contrastive Stealing Attacks Against Image Encoders., , , , and . CoRR, (2022)