Author of the publication

Robust anomaly detection and backdoor attack detection via differential privacy.

, , and . ICLR, OpenReview.net, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Safe Harbor for AI Evaluation and Red Teaming., , , , , , , , , and 13 other author(s). CoRR, (2024)PresenceSense: zero-training algorithm for individual presence detection based on power monitoring., , , , and . BuildSys@SenSys, page 1-10. ACM, (2014)Accountable Data Fusion and Privacy Preservation Techniques in Cyber-Physical Systems.. University of California, Berkeley, USA, (2018)base-search.net (ftcdlib:qt8kh6s51w).InfoBERT: Improving Robustness of Language Models from An Information Theoretic Perspective., , , , , , and . ICLR, OpenReview.net, (2021)Data Banzhaf: A Robust Data Valuation Framework for Machine Learning., and . AISTATS, volume 206 of Proceedings of Machine Learning Research, page 6388-6421. PMLR, (2023)Revisiting Data-Free Knowledge Distillation with Poisoned Teachers., , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 13199-13212. PMLR, (2023)Algorithm of Thoughts: Enhancing Exploration of Ideas in Large Language Models., , , , , and . CoRR, (2023)On the Impact of Perceptual Compression on Deep Learning., , , , and . MIPR, page 219-224. IEEE, (2020)Practical Membership Inference Attacks Against Large-Scale Multi-Modal Models: A Pilot Study., , , and . ICCV, page 4848-4858. IEEE, (2023)Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy., , and . CoRR, (2019)