Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differentially Private Fair Learning., , , , , , and . CoRR, (2018)On the Intriguing Connections of Regularization, Input Gradients and Transferability of Evasion and Poisoning Attacks., , , , , , , and . CoRR, (2018)Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks., , , , , , , and . USENIX Security Symposium, page 321-338. USENIX Association, (2019)Quantifying Memorization Across Neural Language Models., , , , , and . CoRR, (2022)Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC., , , , and . ESORICS (1), volume 11735 of Lecture Notes in Computer Science, page 404-426. Springer, (2019)High-Fidelity Extraction of Neural Network Models., , , , and . CoRR, (2019)Network and system level security in connected vehicle applications., , , , , , , and . ICCAD, page 94. ACM, (2018)Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning., , , , , and . IEEE Symposium on Security and Privacy, page 19-35. IEEE Computer Society, (2018)Differentially Private Fair Learning., , , , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 3000-3008. PMLR, (2019)Threat Detection for Collaborative Adaptive Cruise Control in Connected Cars., , , , and . WISEC, page 184-189. ACM, (2018)