Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Segmentations-Leak: Membership Inference Attacks and Defenses in Semantic Image Segmentation., , , and . ECCV (23), volume 12368 of Lecture Notes in Computer Science, page 519-535. Springer, (2020)Deep gaze pooling: Inferring and visually decoding search intents from human gaze fixations., , and . Neurocomputing, (2020)InfoScrub: Towards Attribute Privacy by Targeted Obfuscation., , and . CoRR, (2020)Open-Domain, Content-based, Multi-modal Fact-checking of Out-of-Context Images via Online Resources., , and . CoRR, (2021)From Bad to Worse: Using Private Data to Propagate Disinformation on Online Platforms with a Greater Efficiency., , , , , and . CoRR, (2023)Going Beyond Familiar Features for Deep Anomaly Detection., and . CoRR, (2023)Client-specific Property Inference against Secure Aggregation in Federated Learning., , and . WPES@CCS, page 45-60. ACM, (2023)UnGANable: Defending Against GAN-based Face Manipulation., , , , , and . USENIX Security Symposium, page 7213-7230. USENIX Association, (2023)SimSCOOD: Systematic Analysis of Out-of-Distribution Behavior of Source Code Models., , , and . CoRR, (2022)Optimising for Interpretability: Convolutional Dynamic Alignment Networks., , and . IEEE Trans. Pattern Anal. Mach. Intell., 45 (6): 7625-7638 (June 2023)