Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information., , , , , and . CoRR, (2019)When the Curious Abandon Honesty: Federated Learning Is Not Private., , , , , and . CoRR, (2021)Bounding Membership Inference., , , and . CoRR, (2022)ExtremeBB: Enabling Large-Scale Research into Extremism, the Manosphere and Their Correlation by Online Forum Data., , , , and . CoRR, (2021)Markpainting: Adversarial Machine Learning meets Inpainting., , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 5409-5419. PMLR, (2021)Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras., , , , , , and . Internet Measurement Conference, page 551-566. ACM, (2020)Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins., , and . CoRR, (2019)Hearing your touch: A new acoustic side channel on smartphones., , , and . CoRR, (2019)Nudge Attacks on Point-Cloud DNNs., , , and . CoRR, (2020)Sitatapatra: Blocking the Transfer of Adversarial Samples., , , , , and . CoRR, (2019)