From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Machine Learning as an Adversarial Service: Learning Black-Box Adversarial Examples., и . CoRR, (2017)k-fingerprinting: A Robust Scalable Website Fingerprinting Technique., и . USENIX Security Symposium, стр. 1187-1203. USENIX Association, (2016)Extracting Training Data from Diffusion Models., , , , , , , , и . USENIX Security Symposium, стр. 5253-5270. USENIX Association, (2023)Generating steganographic images via adversarial training., и . NIPS, стр. 1954-1963. (2017)Learning Universal Adversarial Perturbations with Generative Models., и . IEEE Symposium on Security and Privacy Workshops, стр. 43-49. IEEE Computer Society, (2018)Beyond Slow Signs in High-fidelity Model Extraction., , , и . CoRR, (2024)Towards transformation-resilient provenance detection of digital media., , , , , и . CoRR, (2020)Tight Auditing of Differentially Private Machine Learning., , , , , , , и . USENIX Security Symposium, стр. 1631-1648. USENIX Association, (2023)Locking Machine Learning Models into Hardware., , , , , , , и . CoRR, (2024)Adaptive Webpage Fingerprinting from TLS Traces., и . DSN, стр. 445-458. IEEE, (2023)