Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning., , , and . CoRR, (2023)Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds., , , and . CoRR, (2022)Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems., , , , , , , and . CoRR, (2022)PermPress: Machine Learning-Based Pipeline to Evaluate Permissions in App Privacy Policies., , , , , , and . IEEE Access, (2022)Generative Models for Security: Attacks, Defenses, and Opportunities., and . CoRR, (2021)Towards Measuring Membership Privacy., , and . CoRR, (2017)Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems., , , and . ICLR, OpenReview.net, (2022)Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting., , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 588-614. Springer, (2015)A Pragmatic Approach to Membership Inferences on Machine Learning Models., , , , , , , and . EuroS&P, page 521-534. IEEE, (2020)Privacy through Fake yet Semantically Real Traces., and . CoRR, (2015)