Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information., , , , , and . CoRR, (2019)When the Curious Abandon Honesty: Federated Learning Is Not Private., , , , , and . CoRR, (2021)Bounding Membership Inference., , , and . CoRR, (2022)ExtremeBB: Enabling Large-Scale Research into Extremism, the Manosphere and Their Correlation by Online Forum Data., , , , and . CoRR, (2021)Markpainting: Adversarial Machine Learning meets Inpainting., , , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 5409-5419. PMLR, (2021)Turning Up the Dial: the Evolution of a Cybercrime Market Through Set-up, Stable, and Covid-19 Eras., , , , , , and . Internet Measurement Conference, page 551-566. ACM, (2020)The Curse of Recursion: Training on Generated Data Makes Models Forget., , , , , and . CoRR, (2023)Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD., , , , and . CoRR, (2023)LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?, , , , and . CoRR, (2023)On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning., , , and . CoRR, (2021)