Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks., , , , and . IEEE Symposium on Security and Privacy, page 582-597. IEEE Computer Society, (2016)Is Federated Learning a Practical PET Yet?, , , , , and . CoRR, (2023)Flocks of Stochastic Parrots: Differentially Private Prompt Learning for Large Language Models., , , and . CoRR, (2023)Learning with Impartiality to Walk on the Pareto Frontier of Fairness, Privacy, and Utility., , , and . CoRR, (2023)The Adversarial Implications of Variable-Time Inference., , , , , , , , and . AISec@CCS, page 103-114. ACM, (2023)Tubes Among Us: Analog Attack on Automatic Speaker Identification., , , , , , and . USENIX Security Symposium, page 265-282. USENIX Association, (2023)Proof-of-Learning is Currently More Broken Than You Think., , , , , , , and . EuroS&P, page 797-816. IEEE, (2023)Unrolling SGD: Understanding Factors Influencing Machine Unlearning., , , and . EuroS&P, page 303-319. IEEE, (2022)Data-Free Model Extraction., , , and . CVPR, page 4771-4780. Computer Vision Foundation / IEEE, (2021)Architectural Backdoors in Neural Networks., , , , and . CVPR, page 24595-24604. IEEE, (2023)