Author of the publication

Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems.

, , , and . ICLR, OpenReview.net, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds., , , and . Proc. Priv. Enhancing Technol., 2022 (3): 222-246 (2022)Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems., , , , , , , and . NDSS, The Internet Society, (2023)On the Choice of Databases in Differential Privacy Composition., , and . CoRR, (2022)Synthesizing Plausible Privacy-Preserving Location Traces., and . IEEE Symposium on Security and Privacy, page 546-563. IEEE Computer Society, (2016)Towards Realistic Membership Inferences: The Case of Survey Data., and . ACSAC, page 116-128. ACM, (2020)Generative Models for Security: Attacks, Defenses, and Opportunities., and . CoRR, (2021)Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems., , , and . ICLR, OpenReview.net, (2022)A Pragmatic Approach to Membership Inferences on Machine Learning Models., , , , , , , and . EuroS&P, page 521-534. IEEE, (2020)Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting., , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 588-614. Springer, (2015)Understanding Membership Inferences on Well-Generalized Learning Models., , , , , , , and . CoRR, (2018)