Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Online power control for the energy harvesting multiple access channel., and . WiOpt, page 16-21. IEEE, (2016)Robust Estimation in Rayleigh Fading Channels Under Bounded Channel Uncertainties, , and . CoRR, (2012)A Group Testing Approach to Random Access for Short-Packet Communication., , , and . ISIT, page 96-100. IEEE, (2019)Assessing Privacy Risks in Language Models: A Case Study on Summarization Tasks., , , , , and . EMNLP (Findings), page 15406-15418. Association for Computational Linguistics, (2023)Capacity of the energy harvesting Gaussian MAC., , and . ISIT, page 2744-2748. IEEE, (2016)Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation., , , , , , , , and . ICLR, OpenReview.net, (2024)When Does Differentially Private Learning Not Suffer in High Dimensions?, , , , , , and . NeurIPS, (2022)Privately Aligning Language Models with Reinforcement Learning., , , , , and . CoRR, (2023)On Privacy and Confidentiality of Communications in Organizational Graphs., , , and . CoRR, (2021)Membership Inference on Word Embedding and Beyond., , , , and . CoRR, (2021)