Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DP-Mix: Mixup-based Data Augmentation for Differentially Private Learning., , , and . CoRR, (2023)Attacks as Defenses: Designing Robust Audio CAPTCHAs Using Attacks on Automatic Speech Recognition Systems., , , , , , , and . CoRR, (2022)PermPress: Machine Learning-Based Pipeline to Evaluate Permissions in App Privacy Policies., , , , , , and . IEEE Access, (2022)Privacy accounting εconomics: Improving differential privacy composition via a posteriori bounds., , , and . CoRR, (2022)Towards Measuring Membership Privacy., , and . CoRR, (2017)Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting., , , , and . RAID, volume 9404 of Lecture Notes in Computer Science, page 588-614. Springer, (2015)Generative Models for Security: Attacks, Defenses, and Opportunities., and . CoRR, (2021)Demystifying Limited Adversarial Transferability in Automatic Speech Recognition Systems., , , and . ICLR, OpenReview.net, (2022)A Pragmatic Approach to Membership Inferences on Machine Learning Models., , , , , , , and . EuroS&P, page 521-534. IEEE, (2020)SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems., , , , and . CoRR, (2020)