Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Comparison of Contemporary DNN Watermarking Techniques., , , , and . CoRR, (2018)Adversarial Reprogramming of Text Classification Neural Networks., , , and . EMNLP/IJCNLP (1), page 5215-5224. Association for Computational Linguistics, (2019)Intellectual Property (IP) Protection for Deep Learning and Federated Learning Models.. IH&MMSec, page 5. ACM, (2022)ZKROWNN: Zero Knowledge Right of Ownership for Neural Networks., , , and . DAC, page 1-6. IEEE, (2023)Techniques for maintaining connectivity in wireless ad-hoc networks under energy constraints., , , , and . ACM Trans. Embed. Comput. Syst., 6 (3): 16 (2007)Tailor: Altering Skip Connections for Resource-Efficient Inference., , , , , , , , and . CoRR, (2023)HypOp: Distributed Constrained Combinatorial Optimization leveraging Hypergraph Neural Networks., , , , and . CoRR, (2023)Behavioral synthesis techniques for intellectual property protection., , and . ACM Trans. Design Autom. Electr. Syst., 10 (3): 523-545 (2005)An Energy-Efficient Last-Level Cache Architecture for Process Variation-Tolerant 3D Microprocessors., , and . IEEE Trans. Computers, 64 (9): 2460-2475 (2015)Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers., , and . CoRR, (2022)