Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disparate Impact on Group Accuracy of Linearization for Private Inference., , and . CoRR, (2024)STRAIN: an R package for multi-locus sequence typing from whole genome sequencing data., , , , , , , and . BMC Bioinform., 20-S (9): 347:1-347:8 (2019)Machine learning methods for privacy protection : leakage measurement and mechanisms design. (Méthodes d'apprentissage machine pour la protection de la vie privée : mesure de leakage et design des mécanismes).. Institut Polytechnique of Paris, France, (2020)Optimal Obfuscation Mechanisms via Machine Learning., , and . CSF, page 153-168. IEEE, (2020)Generating Optimal Privacy-Protection Mechanisms via Machine Learning., , and . CoRR, (2019)A Halfspace-Mass Depth-Based Method for Adversarial Attack Detection., , , , , , and . Trans. Mach. Learn. Res., (2023)Perfectly Accurate Membership Inference by a Dishonest Central Server in Federated Learning., , , and . CoRR, (2022)MoZuMa: A Model Zoo for Multimedia Applications., , , , and . ACM Multimedia, page 7335-7338. ACM, (2022)Retrieval-Guided Reinforcement Learning for Boolean Circuit Minimization., , , , and . CoRR, (2024)MEAD: A Multi-Armed Approach for Evaluation of Adversarial Examples Detectors., , , , and . ECML/PKDD (3), volume 13715 of Lecture Notes in Computer Science, page 286-303. Springer, (2022)