Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mendata: A Framework to Purify Manipulated Training Data., , and . CoRR, (2023)SoK: Secure Human-centered Wireless Sensing., , and . Proc. Priv. Enhancing Technol., 2024 (2): 313-329 (2024)GradSafe: Detecting Jailbreak Prompts for LLMs via Safety-Critical Gradient Analysis., , , and . ACL (1), page 507-518. Association for Computational Linguistics, (2024)Membership Inference Attack in Face of Data Transformations., , , and . CNS, page 299-307. IEEE, (2022)Visual Hallucinations of Multi-modal Large Language Models., , , and . ACL (Findings), page 9614-9631. Association for Computational Linguistics, (2024)SneakyPrompt: Jailbreaking Text-to-image Generative Models., , , , and . SP, page 897-912. IEEE, (2024)Securing the Future of GenAI: Policy and Technology., , , , , , , , , and 4 other author(s). CoRR, (2024)SoK: Inference Attacks and Defenses in Human-Centered Wireless Sensing., , and . CoRR, (2022)Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning., , and . CoRR, (2024)Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN), , , , , , , and . CoRR, (2011)