Author of the publication

SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.

, , , , , , , and . SP, page 327-345. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

QnAMaker: Data to Bot in 2 Minutes., , , , , , , , , and 8 other author(s). CoRR, (2020)A2-LINK: Recognizing Disguised Faces via Active Learning and Adversarial Noise Based Inter-Domain Knowledge., , and . IEEE Trans. Biom. Behav. Identity Sci., 2 (4): 326-336 (2020)Do Membership Inference Attacks Work on Large Language Models?, , , , , , , , , and . CoRR, (2024)QnAMaker: Data to Bot in 2 Minutes., , , , , , , , , and 8 other author(s). WWW (Companion Volume), page 131-134. ACM / IW3C2, (2020)Towards Understanding Crisis Events On Online Social Networks Through Pictures., , , , and . ASONAM, page 439-446. ACM, (2017)Hardening Deep Neural Networks via Adversarial Model Cascades., , , and . CoRR, (2018)Visual Themes and Sentiment on Social Networks To Aid First Responders During Crisis Events., , , , and . CoRR, (2016)Subject Membership Inference Attacks in Federated Learning., , , and . CoRR, (2022)SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning., , , , , , , and . SP, page 327-345. IEEE, (2023)Manipulating Transfer Learning for Property Inference., , , , and . CVPR, page 15975-15984. IEEE, (2023)