Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust and Actively Secure Serverless Collaborative Learning., , , , , , , , , and . CoRR, (2023)DeepLens: Towards a Visual Data Management System., , and . CIDR, www.cidrdb.org, (2019)Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation., , , , , and . EuroS&P, page 241-257. IEEE, (2023)An Empirical Evaluation of Perturbation-based Defenses., and . CoRR, (2020)Efficient Model-Stealing Attacks Against Inductive Graph Neural Networks., , , , , and . CoRR, (2024)DBMS Data Loading: An Analysis on Modern Hardware., , , , and . ADMS/IMDM@VLDB, volume 10195 of Lecture Notes in Computer Science, page 95-117. Springer, (2016)Data transformation and migration in polystores., , and . HPEC, page 1-6. IEEE, (2016)Pretrained Transformers Improve Out-of-Distribution Robustness., , , , , and . ACL, page 2744-2751. Association for Computational Linguistics, (2020)Increasing the Cost of Model Extraction with Calibrated Proof of Work., , , and . ICLR, OpenReview.net, (2022)On the Difficulty of Defending Self-Supervised Learning against Model Extraction., , , , and . ICML, volume 162 of Proceedings of Machine Learning Research, page 5757-5776. PMLR, (2022)