Personensuche
X
?
2024 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
1
Generated Distributions Are All You Need for Membership Inf..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
3
On the Evolution of (Hateful) Memes by Means of Multimodal ..:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
4
SEAL: Capability-Based Access Control for Data-Analytic Sce..:
, In:
?
Southern Space Studies; Space Fostering African Societies ,
5
The Namibian Multi-wavelength Observatory—Towards Sustained..:
, In:
?
2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) ,
6
Can't Steal? Cont-Steal! Contrastive Stealing Attacks Again..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
7
Unsafe Diffusion: On the Generation of Unsafe Images and Ha..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
10
Membership Inference Attacks by Exploiting Loss Trajectory:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
11
Why So Toxic? : Measuring and Triggering Toxic Behavior ..:
, In:
?
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) ,
12
Dynamic Backdoor Attacks Against Machine Learning Models:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
13
A Framework for Constructing Single Secret Leader Election ..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
14
On the Privacy Risks of Cell-Based NAS Architectures:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
15