From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning., , , , и . CoRR, (2019)Fast Light Field Reconstruction Using Convolutional Neural Network to Double Angular Resolution., , и . ICCE, стр. 1-4. IEEE, (2020)RCA-LF: Dense Light Field Reconstruction Using Residual Channel Attention Networks., , и . Sensors, 22 (14): 5254 (2022)Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning., , , , и . USENIX Security Symposium, стр. 1291-1308. USENIX Association, (2020)Two-in-One: A Model Hijacking Attack Against Text Generation Models., , , и . USENIX Security Symposium, стр. 2223-2240. USENIX Association, (2023)Applying game theory rules to enhance decision support systems in credit and financial applications., , , , и . CGAMES, стр. 1-10. IEEE Computer Society, (2014)Physical Layer Authentication Based on CFO and Visibility Graph., , , и . NaNA, стр. 147-152. IEEE, (2018)Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition., , , , , , , , , и 11 other автор(ы). CoRR, (2024)Bayesian Estimation of Differential Privacy., , , , , , , , и . ICML, том 202 из Proceedings of Machine Learning Research, стр. 40624-40636. PMLR, (2023)SOS! Soft Prompt Attack Against Open-Source Large Language Models., , , и . CoRR, (2024)