Author of the publication

Grey-box Extraction of Natural Language Models.

, , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 12278-12286. PMLR, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verified security of redundancy-free encryption from Rabin and RSA., , and . CCS, page 724-735. ACM, (2012)HACLxN: Verified Generic SIMD Crypto (for all your favourite platforms)., , , , , , and . ACM Conference on Computer and Communications Security, page 899-918. ACM, (2020)Computer-Aided Cryptographic Proofs., , , , and . ITP, volume 7406 of Lecture Notes in Computer Science, page 11-27. Springer, (2012)Formal certification of game-based cryptographic proofs. (Certification formelle de preuves cryptographiques basées sur les séquences de jeux).. Mines ParisTech, France, (2010)Everest: Towards a Verified, Drop-in Replacement of HTTPS., , , , , , , , , and 12 other author(s). SNAPL, volume 71 of LIPIcs, page 1:1-1:12. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Closed-Form Bounds for DP-SGD against Record-level Inference., , , , , and . USENIX Security Symposium, USENIX Association, (2024)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2019)On the Efficacy of Differentially Private Few-shot Image Classification., , , , , , , and . CoRR, (2023)Imperfect forward secrecy: how Diffie-Hellman fails in practice., , , , , , , , , and 4 other author(s). Commun. ACM, 62 (1): 106-114 (2019)Analyzing Information Leakage of Updates to Natural Language Models., , , , , , , and . CCS, page 363-375. ACM, (2020)