Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Origins of Low-dimensional Adversarial Perturbations., , and . CoRR, (2022)An Introduction to Vision-Language Modeling., , , , , , , , , and 31 other author(s). CoRR, (2024)Information Flow Control in Machine Learning through Modular Model Architecture., , , , , , , , , and . CoRR, (2023)Large-Scale Public Data Improves Differentially Private Image Generation Quality., , and . CoRR, (2023)Does Label Differential Privacy Prevent Label Inference Attacks?, , , and . CoRR, (2022)Threats and Countermeasures in Machine Learning Applications.. Cornell University, USA, (2020)A New Defense Against Adversarial Images: Turning a Weakness into a Strength., , , , and . NeurIPS, page 1633-1644. (2019)Gradient-based Adversarial Attacks against Text Transformers., , , and . EMNLP (1), page 5747-5757. Association for Computational Linguistics, (2021)Information Flow Control in Machine Learning through Modular Model Architecture., , , , , , , , , and . USENIX Security Symposium, USENIX Association, (2024)Countering Adversarial Images using Input Transformations., , , and . ICLR (Poster), OpenReview.net, (2018)