From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Hidden Voice Commands., , , , , , , и . USENIX Security Symposium, стр. 513-530. USENIX Association, (2016)Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples., , , , , , , и . CoRR, (2021)AdaMatch: A Unified Approach to Semi-Supervised Learning and Domain Adaptation., , , , и . CoRR, (2021)Handcrafted Backdoors in Deep Neural Networks., , и . CoRR, (2021)Ground-Truth Adversarial Examples., , , и . CoRR, (2017)Report of the 1st Workshop on Generative AI and Law., , , , , , , , , и 25 other автор(ы). CoRR, (2023)Extracting Training Data from Large Language Models., , , , , , , , , и 2 other автор(ы). CoRR, (2020)Session details: Session 2A: Machine Learning for Cybersecurity.. AISec@CCS, ACM, (2021)Membership Inference Attacks From First Principles., , , , , и . SP, стр. 1897-1914. IEEE, (2022)Tight Auditing of Differentially Private Machine Learning., , , , , , , и . USENIX Security Symposium, стр. 1631-1648. USENIX Association, (2023)