Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models., , , , and . CoRR, (2023)BTLab: A System-Centric, Data-Driven Analysis and Measurement Platform for BitTorrent Clients., , , and . ICCCN, page 1-6. IEEE, (2011)Understanding user behavior in large-scale video-on-demand systems., , , and . EuroSys, page 333-344. ACM, (2006)Unsupervised Clickstream Clustering for User Behavior Analysis., , , , and . CHI, page 225-236. ACM, (2016)SoK: Anti-Facial Recognition Technology., , , and . SP, page 864-881. IEEE, (2023)Finding Naturally Occurring Physical Backdoors in Image Datasets., , , , , , and . NeurIPS, (2022)Understanding Robust Learning through the Lens of Representation Similarities., , , , , and . NeurIPS, (2022)Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash., , , , and . HT, page 123-127. ACM, (2018)On the performance of cloud storage applications with global measurement., , , , , , , and . IWQoS, page 1-10. IEEE, (2016)Uncovering User Interaction Dynamics in Online Social Networks., , , , and . ICWSM, page 698-701. AAAI Press, (2015)