Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security Relevance of Initial Weights in Deep Neural Networks., , , , and . ICANN (1), volume 12396 of Lecture Notes in Computer Science, page 3-14. Springer, (2020)Periodicity detection in irregularly sampled light curves by robust regression and outlier detection., , , and . Stat. Anal. Data Min., 6 (1): 73-89 (2013)TrollThrottle - Raising the Cost of Astroturfing., , , , and . ACNS (2), volume 12147 of Lecture Notes in Computer Science, page 456-476. Springer, (2020)Membership Privacy for Fully Dynamic Group Signatures., , and . ACM Conference on Computer and Communications Security, page 2181-2198. ACM, (2019)AnoA: A Framework for Analyzing Anonymous Communication Protocols., , , , and . J. Priv. Confidentiality, (2016)Comprehensive Assessment of Toxicity in ChatGPT., , , , , , , , and . CoRR, (2023)PrivSyn: Differentially Private Data Synthesis., , , , , , , and . CoRR, (2020)Industrial practitioners' mental models of adversarial machine learning., , , , and . SOUPS @ USENIX Security Symposium, page 97-116. USENIX Association, (2022)Generated Graph Detection., , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 23412-23428. PMLR, (2023)On Xing Tian and the Perseverance of Anti-China Sentiment Online., , , , , and . ICWSM, page 944-955. AAAI Press, (2022)