Personensuche
X
?
2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
1
Generated Distributions Are All You Need for Membership Inf..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
3
On the Evolution of (Hateful) Memes by Means of Multimodal ..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
4
Unsafe Diffusion: On the Generation of Unsafe Images and Ha..:
, In:
?
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) ,
6
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Again..:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
7
SEAL: Capability-Based Access Control for Data-Analytic Sce..:
, In:
?
Southern Space Studies; Space Fostering African Societies ,
9
The Namibian Multi-wavelength Observatory—Towards Sustained..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
10
Membership Inference Attacks by Exploiting Loss Trajectory:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
11
Auditing Membership Leakages of Multi-Exit Networks:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
12
A Framework for Constructing Single Secret Leader Election ..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
13
Finding MNEMON : Reviving Memories of Node Embeddings:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
15