From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proconda - Protected Control Data., , , и . CoRR, (2019)ARTist: The Android Runtime Instrumentation and Security Toolkit., , , , и . EuroS&P, стр. 481-495. IEEE, (2017)Fairwalk: Towards Fair Graph Embedding, , , и . Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, стр. 3289--3295. Macao, China, International Joint Conferences on Artificial Intelligence Organization, (августа 2019)Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup., , , , и . Public Key Cryptography (1), том 11442 из Lecture Notes in Computer Science, стр. 286-313. Springer, (2019)Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks., , и . Proc. Priv. Enhancing Technol., 2016 (2): 40-60 (2016)Conversation Reconstruction Attack Against GPT Models., , , и . CoRR, (2024)Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning., , , и . CoRR, (2020)SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models., , , , , , и . CoRR, (2023)UnGANable: Defending Against GAN-based Face Manipulation., , , , , и . CoRR, (2022)Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights., , , , , , , и . CoRR, (2023)