Author of the publication

Token-Level Adversarial Prompt Detection Based on Perplexity Measures and Contextual Information.

, , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Training Streaming Factorization Machines with Alternating Least Squares., , and . SIGIR, page 1185-1188. ACM, (2019)Digital content recommendation system using implicit feedback data., , , and . IEEE BigData, page 2766-2771. IEEE Computer Society, (2017)SODA: Protecting Proprietary Information in On-Device Machine Learning Models., , , and . SEC, page 121-132. IEEE, (2023)Local and On-the-fly Choreography-based Web Service Composition., , and . Web Intelligence, page 521-527. IEEE Computer Society, (2007)A partial encryption scheme for AVC video., and . ESPA, page 1-4. IEEE, (2012)Automated Choreographer Synthesis for Web Services Composition Using I/O Automata., , and . ICWS, page 364-371. IEEE Computer Society, (2007)Near Neighbor Search for Constraint Queries., , , , , , and . IEEE Big Data, page 1707-1715. IEEE, (2023)Contextualized Styling of Images for Web Interfaces using Reinforcement Learning., , , , , , , and . ISM, page 169-172. IEEE, (2022)Scalable Bid Landscape Forecasting in Real-Time Bidding., , , , , and . ECML/PKDD (3), volume 11908 of Lecture Notes in Computer Science, page 451-466. Springer, (2019)Privacy Aware Experiments without Cookies., , , , , and . WSDM, page 1144-1147. ACM, (2023)