Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Soft Prompts Go Hard: Steering Visual Language Models with Hidden Meta-Instructions., , , , and . CoRR, (2024)Operationalizing Contextual Integrity in Privacy-Conscious Assistants., , , , , , , , , and 3 other author(s). CoRR, (2024)Differential Privacy Has Disparate Impact on Model Accuracy., and . CoRR, (2019)Blind Backdoors in Deep Learning Models., and . USENIX Security Symposium, page 1505-1521. USENIX Association, (2021)Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures., and . SP, page 769-786. IEEE, (2022)Ancile: Enhancing Privacy for Ubiquitous Computing with Use-Based Privacy., , , , , , and . WPES@CCS, page 111-124. ACM, (2019)Modularizing deep neural network-inspired recommendation algorithms., , and . RecSys, page 533-534. ACM, (2018)X-Containers: Breaking Down Barriers to Improve Performance and Isolation of Cloud-Native Containers., , , , , , and . ASPLOS, page 121-135. ACM, (2019)Injecting Bias in Text-To-Image Models via Composite-Trigger Backdoors., , , and . CoRR, (2024)Adversarial Illusions in Multi-Modal Embeddings., , , and . USENIX Security Symposium, USENIX Association, (2024)