Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computing minimal interpolants in $C^1, 1(R^d)$., , and . CoRR, (2014)Toward Trustworthy AI Development: Mechanisms for Supporting Verifiable Claims., , , , , , , , , and 49 other author(s). CoRR, (2020)The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning., , , , , , , , , and 44 other author(s). CoRR, (2024)Extracting Training Data from Large Language Models., , , , , , , , , and 2 other author(s). CoRR, (2020)Evaluating Large Language Models Trained on Code., , , , , , , , , and 48 other author(s). CoRR, (2021)Extracting Training Data from Large Language Models., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 2633-2650. USENIX Association, (2021)Language Models are Few-Shot Learners., , , , , , , , , and 21 other author(s). NeurIPS, (2020)Release Strategies and the Social Impacts of Language Models., , , , , , , and . CoRR, (2019)