Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ClearMark: Intuitive and Robust Model Watermarking via Transposed Model Training, , and . ArXiv | arXiv:2310.16453v1, (October 2023)DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification, , and . arXiv:2403.06581, (March 2024)DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification, , and . arXiv:2403.06581, (March 2024)ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training, , and . To Appear in the 33rd USENIX Security Symposium (USENIX Security 2024), (2024)Cloud-Based Machine Learning Models as Covert Communication Channels, , and . To appear in the 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2024), (2024)Understanding UI attacks on Android. University of Würzburg, Bachelor Thesis, (December 2020)ClearStamp: A Human-Visible and Robust Model-Ownership Proof based on Transposed Model Training, , and . To Appear in the 33rd USENIX Security Symposium (USENIX Security 2024), (2024)