From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks., , , , , , и . IEEE Symposium on Security and Privacy, стр. 707-723. IEEE, (2019)Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks., , , , , и . CoRR, (2019)Patch-based Defenses against Web Fingerprinting Attacks., , , и . AISec@CCS, стр. 97-109. ACM, (2021)Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks., , , и . USENIX Security Symposium, стр. 3575-3592. USENIX Association, (2022)Traceback of Data Poisoning Attacks in Neural Networks., , , и . CoRR, (2021)Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models., , , , и . CoRR, (2023)Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks., , , , , и . USENIX Security Symposium, стр. 2117-2134. USENIX Association, (2022)Unpacking Perceptions of Data-Driven Inferences Underlying Online Targeting and Personalization., , , , , , и . CHI, стр. 493. ACM, (2018)Penny Auctions are Predictable: Predicting and Profiling User Behavior on DealDash., , , , и . HT, стр. 123-127. ACM, (2018)Post-breach Recovery: Protection against White-box Adversarial Examples for Leaked DNN Models., , , , и . CCS, стр. 2611-2625. ACM, (2022)