Author of the publication

Towards Sentence Level Inference Attack Against Pre-trained Language Models.

, , , , and . Proc. Priv. Enhancing Technol., 2023 (3): 62-78 (July 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FLShield: A Validation Based Federated Learning Framework to Defend Against Poisoning Attacks., , , and . CoRR, (2023)Towards Sentence Level Inference Attack Against Pre-trained Language Models., , , , and . Proc. Priv. Enhancing Technol., 2023 (3): 62-78 (July 2023)GNNBleed: Inference Attacks to Unveil Private Edges in Graphs with Realistic Access to GNN Models., , and . CoRR, (2023)Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models., , , , and . USENIX Security Symposium, page 4579-4596. USENIX Association, (2022)An Efficient Localized Chain Construction Scheme for Chain Oriented Wireless Sensor Networks., , and . ISADS, page 3-9. IEEE Computer Society, (2011)SecCOSEn - A Key Management Scheme for Securing Chain Oriented Sensor Networks., and . CNSR, page 584-592. IEEE Computer Society, (2008)Proxy based Two Phase Commit with Wait for Improved Response Time and Blocking Probability., and . IASTED PDCS, page 361-366. IASTED/ACTA Press, (2005)A Chain Oriented Data Collection Protocol for Energy-Aware and Delay-Constrained WSN., , , and . Afr. J. Inf. Commun. Technol., (2006)Selecting Member Nodes in a Chain Oriented WSN., , and . WCNC, page 1-6. IEEE, (2010)COSEN: A Chain Oriented Sensor Network for Efficient Data Collection., , and . ITNG, page 262-267. IEEE Computer Society, (2006)