Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complex Backdoor Detection by Symmetric Feature Differencing., , , , , and . CVPR, page 14983-14993. IEEE, (2022)Training with More Confidence: Mitigating Injected and Natural Backdoors During Training., , , and . NeurIPS, (2022)ABS: Scanning Neural Networks for Back-doors by Artificial Brain Stimulation., , , , , and . CCS, page 1265-1282. ACM, (2019)ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction and Representation Learning., , , and . USENIX Security Symposium, page 3023-3040. USENIX Association, (2021)The Case for Learned Provenance Graph Storage Systems., , , and . USENIX Security Symposium, page 3277-3294. USENIX Association, (2023)DIAGNOSIS: Detecting Unauthorized Data Usages in Text-to-image Diffusion Models., , , , and . ICLR, OpenReview.net, (2024)Towards General Robustness Verification of MaxPool-based Convolutional Neural Networks via Tightening Linear Approximation., , , , , and . CoRR, (2024)Uncertainty is Fragile: Manipulating Uncertainty in Large Language Models., , , , , , , , , and 5 other author(s). CoRR, (2024)KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against ASR Systems., , , , , , and . USENIX Security Symposium, page 247-264. USENIX Association, (2023)COLO: COarse-grained LOck-stepping virtual machines for non-stop service., , , , , , and . SoCC, page 3:1-3:16. ACM, (2013)