From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Data Isotopes for Data Provenance in DNNs., , , и . CoRR, (2022)Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models., , , , , и . USENIX Security Symposium, стр. 2187-2204. USENIX Association, (2023)Fawkes: Protecting Privacy against Unauthorized Deep Learning Models., , , , , и . USENIX Security Symposium, стр. 1589-1604. USENIX Association, (2020)Fawkes: Protecting Personal Privacy against Unauthorized Deep Learning Models., , , , , и . CoRR, (2020)Blacklight: Defending Black-Box Adversarial Attacks on Deep Neural Networks., , , , , и . CoRR, (2020)Data Isotopes for Data Provenance in DNNs., , , и . Proc. Priv. Enhancing Technol., 2024 (1): 413-429 (января 2024)Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks., , , , , и . CCS, стр. 67-83. ACM, (2020)SoK: Anti-Facial Recognition Technology., , , и . CoRR, (2021)SALSA FRESCA: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors., , , , , , и . IACR Cryptol. ePrint Arch., (2024)SalsaPicante: A Machine Learning Attack on LWE with Binary Secrets., , , , , , и . CCS, стр. 2606-2620. ACM, (2023)