From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Unleashing the Tiger: Inference Attacks on Split Learning., , и . CCS, стр. 2113-2129. ACM, (2021)Adversarial Out-domain Examples for Generative Models., , и . EuroS&P Workshops, стр. 272-280. IEEE, (2019)On the (In)security of Peer-to-Peer Decentralized Machine Learning., , и . SP, стр. 418-436. IEEE, (2023)Interpretable Probabilistic Password Strength Meters via Deep Learning., , и . ESORICS (1), том 12308 из Lecture Notes in Computer Science, стр. 502-522. Springer, (2020)Improving Password Guessing via Representation Learning., , , , и . IACR Cryptology ePrint Archive, (2019)Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services., , , и . IACR Cryptol. ePrint Arch., (2023)BootCMatchG: An adaptive Algebraic MultiGrid linear solver for GPUs., , и . Softw. Impacts, (2020)Eluding Secure Aggregation in Federated Learning via Model Inconsistency., , и . CCS, стр. 2429-2443. ACM, (2022)Neural Exec: Learning (and Learning from) Execution Triggers for Prompt Injection Attacks., , и . CoRR, (2024)Unleashing the Tiger: Inference Attacks on Split Learning., , и . CoRR, (2020)