Author of the publication

PrivMon: A Stream-Based System for Real-Time Privacy Attack Detection for Machine Learning Models.

, , , , , , and . RAID, page 264-281. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visual understanding environment., and . JCDL, page 413. ACM, (2005)An Efficient Class of Estimators in Stratified Random Sampling with an Application to Real Data., , , , and . Axioms, 12 (6): 576 (June 2023)Scaling NLP algorithms to meet high demand., , , and . IEEE BigData, page 2839. IEEE Computer Society, (2015)Calibrating User Bias In Sentiment Estimation From Social Media., and . IEEE BigData, page 3682-3690. IEEE, (2018)A Distributed Logical Filter for Connected Row Convex Constraints., , , , , and . ICTAI, page 96-101. IEEE Computer Society, (2017)Agenda-Driven Question Generation: A Case Study in the Courtroom Domain., , , , and . LREC/COLING, page 572-583. ELRA and ICCL, (2024)FlagIt: A System for Minimally Supervised Human Trafficking Indicator Mining., , , , and . CoRR, (2017)Detection of Aphid-Infested Mustard Crop Using Ground Spectroscopy., , , , , , and . Remote. Sens., 16 (1): 47 (January 2024)An energy-efficient prediction model for data aggregation in sensor network., and . J. Ambient Intell. Humaniz. Comput., 11 (11): 5205-5216 (2020)Predicting Interaction Quality of Conversational Assistants With Spoken Language Understanding Model Confidences., , , , , , and . CIKM, page 4581-4587. ACM, (2023)