Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proconda - Protected Control Data., , , and . CoRR, (2019)ARTist: The Android Runtime Instrumentation and Security Toolkit., , , , and . EuroS&P, page 481-495. IEEE, (2017)Fairwalk: Towards Fair Graph Embedding, , , and . Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, page 3289--3295. Macao, China, International Joint Conferences on Artificial Intelligence Organization, (August 2019)Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup., , , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 286-313. Springer, (2019)Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks., , and . Proc. Priv. Enhancing Technol., 2016 (2): 40-60 (2016)Conversation Reconstruction Attack Against GPT Models., , , and . CoRR, (2024)Privacy Analysis of Deep Learning in the Wild: Membership Inference Attacks against Transfer Learning., , , and . CoRR, (2020)SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models., , , , , , and . CoRR, (2023)UnGANable: Defending Against GAN-based Face Manipulation., , , , , and . CoRR, (2022)Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights., , , , , , , and . CoRR, (2023)