Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Searching for a Search Method: Benchmarking Search Algorithms for Generating NLP Adversarial Examples., , , and . BlackboxNLP@EMNLP, page 323-332. Association for Computational Linguistics, (2020)Unsupervised Text Deidentification., , , and . EMNLP (Findings), page 4777-4788. Association for Computational Linguistics, (2022)Extracting Prompts by Inverting LLM Outputs., , and . CoRR, (2024)Crafting Interpretable Embeddings by Asking LLMs Questions., , , , , , and . CoRR, (2024)TextAttack: A Framework for Adversarial Attacks, Data Augmentation, and Adversarial Training in NLP., , , , , and . EMNLP (Demos), page 119-126. Association for Computational Linguistics, (2020)Do language models plan ahead for future tokens?, , and . CoRR, (2024)Language Model Inversion., , , , and . ICLR, OpenReview.net, (2024)Language Model Inversion., , , , and . CoRR, (2023)Second-Order NLP Adversarial Examples.. BlackboxNLP@EMNLP, page 228-237. Association for Computational Linguistics, (2020)Text Embeddings Reveal (Almost) As Much As Text., , , and . EMNLP, page 12448-12460. Association for Computational Linguistics, (2023)