Author of the publication

Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release.

, , , , , , and . AINA, page 1130-1137. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Quantum Communication Protocol Using Insecure Public Channels., , , and . SEC, volume 181 of IFIP, page 113-126. Springer, (2005)A Simple Non-Interactive Pairwise Key Establishment Scheme in Sensor Networks., , and . SECON, page 1-9. IEEE, (2009)Top-$k$ Query Result Completeness Verification in Tiered Sensor Networks., , , , and . IEEE Trans. Inf. Forensics Secur., 9 (1): 109-124 (2014)Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications., , , and . IEEE Access, (2020)Ring-A-Bell! How Reliable are Concept Removal Methods for Diffusion Models?, , , , , , , , and . CoRR, (2023)Adversarial Examples Can Be Effective Data Augmentation for Unsupervised Machine Learning., , , , and . AAAI, page 6926-6934. AAAI Press, (2022)Data-Driven Approach for Evaluating Risk of Disclosure and Utility in Differentially Private Data Release., , , , , , and . AINA, page 1130-1137. IEEE Computer Society, (2017)Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment., , , , and . ICDCS Workshops, page 18. IEEE Computer Society, (2007)Safe LoRA: the Silver Lining of Reducing Safety Risks when Fine-tuning Large Language Models., , , , , and . CoRR, (2024)Rethinking Backdoor Attacks on Dataset Distillation: A Kernel Method Perspective., , , , , and . ICLR, OpenReview.net, (2024)