From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Transformer-Boosted Anomaly Detection with Fuzzy Hashes., , , и . CoRR, (2022)Plug & Play Attacks: Towards Robust and Flexible Model Inversion Attacks., , , , и . ICML, том 162 из Proceedings of Machine Learning Research, стр. 20522-20545. PMLR, (2022)The Biased Artist: Exploiting Cultural Biases via Homoglyphs in Text-Guided Image Generation Models., , и . CoRR, (2022)Rickrolling the Artist: Injecting Backdoors into Text Encoders for Text-to-Image Synthesis., , и . ICCV, стр. 4561-4573. IEEE, (2023)Does CLIP Know My Face?, , , , , и . J. Artif. Intell. Res., (2024)Defending Our Privacy With Backdoors., , , и . CoRR, (2023)Learning to Break Deep Perceptual Hashing: The Use Case NeuralHash., , , и . FAccT, стр. 58-69. ACM, (2022)To Trust or Not To Trust Prediction Scores for Membership Inference Attacks., , и . IJCAI, стр. 3043-3049. ijcai.org, (2022)Be Careful What You Smooth For: Label Smoothing Can Be a Privacy Shield but Also a Catalyst for Model Inversion Attacks., , и . ICLR, OpenReview.net, (2024)Fair Diffusion: Instructing Text-to-Image Generation Models on Fairness., , , , , , и . CoRR, (2023)