Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- Michael Backes
- Michael Backes 0001
CISPA Helmholtz Center for Information Security, Saarbrücken, Germany - Michael Backes 0002
University of Namibia, Department of Physics, Windhoek, Namibia - Michael Backes 0003
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 506 matches
- 2024
- Yixin Wu, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Link Stealing Attacks Against Inductive Graph Neural Networks. Proc. Priv. Enhancing Technol. 2024(4): 818-839 (2024) - Yiting Qu, Zhikun Zhang, Yun Shen, Michael Backes, Yang Zhang:
FAKEPCD: Fake Point Cloud Detection via Source Attribution. AsiaCCS 2024 - Ge Han, Ahmed Salem, Zheng Li, Shanqing Guo, Michael Backes, Yang Zhang:
Detection and Attribution of Models Trained on Generated Data. ICASSP 2024: 4875-4879 - Wenhao Wang, Muhammad Ahmad Kaleem, Adam Dziedzic, Michael Backes, Nicolas Papernot, Franziska Boenisch:
Memorization in Self-Supervised Learning Improves Downstream Generalization. ICLR 2024 - Yue Huang, Lichao Sun, Haoran Wang, Siyuan Wu, Qihui Zhang, Yuan Li, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Hanchi Sun, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bertie Vidgen, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, Joaquin Vanschoren, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yong Chen, Yue Zhao:
Position: TrustLLM: Trustworthiness in Large Language Models. ICML 2024 - Yukun Jiang, Xinyue Shen, Rui Wen, Zeyang Sha, Junjie Chu, Yugeng Liu, Michael Backes, Yang Zhang:
Games and Beyond: Analyzing the Bullet Chats of Esports Livestreaming. ICWSM 2024: 761-773 - Nick Feng, Alan J. Hu, Sam Bayless, Syed M. Iqbal, Patrick Trentin, Mike Whalen, Lee Pike, John Backes:
DRAT Proofs of Unsatisfiability for SAT Modulo Monotonic Theories. TACAS (1) 2024: 3-23 - Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang:
Prompt Stealing Attacks Against Text-to-Image Generation Models. USENIX Security Symposium 2024 - Yixin Wu, Rui Wen, Michael Backes, Pascal Berrang, Mathias Humbert, Yun Shen, Yang Zhang:
Quantifying Privacy Risks of Prompts in Visual Prompt Learning. USENIX Security Symposium 2024 - Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang:
SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models. USENIX Security Symposium 2024 - Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Instruction Backdoor Attacks Against Customized LLMs. USENIX Security Symposium 2024 - Minxing Zhang, Ning Yu, Rui Wen, Michael Backes, Yang Zhang:
Generated Distributions Are All You Need for Membership Inference Attacks Against Generative Models. WACV 2024: 4827-4837 - Lichao Sun, Yue Huang, Haoran Wang, Siyuan Wu, Qihui Zhang, Chujie Gao, Yixin Huang, Wenhan Lyu, Yixuan Zhang, Xiner Li, Zhengliang Liu, Yixin Liu, Yijue Wang, Zhikun Zhang, Bhavya Kailkhura, Caiming Xiong, Chaowei Xiao, Chunyuan Li, Eric P. Xing, Furong Huang, Hao Liu, Heng Ji, Hongyi Wang, Huan Zhang, Huaxiu Yao, Manolis Kellis, Marinka Zitnik, Meng Jiang, Mohit Bansal, James Zou, Jian Pei, Jian Liu, Jianfeng Gao, Jiawei Han, Jieyu Zhao, Jiliang Tang, Jindong Wang, John C. Mitchell, Kai Shu, Kaidi Xu, Kai-Wei Chang, Lifang He, Lifu Huang, Michael Backes, Neil Zhenqiang Gong, Philip S. Yu, Pin-Yu Chen, Quanquan Gu, Ran Xu, Rex Ying, Shuiwang Ji, Suman Jana, Tianlong Chen, Tianming Liu, Tianyi Zhou, William Wang, Xiang Li, Xiangliang Zhang, Xiao Wang, Xing Xie, Xun Chen, Xuyu Wang, Yan Liu, Yanfang Ye, Yinzhi Cao, Yue Zhao:
TrustLLM: Trustworthiness in Large Language Models. CoRR abs/2401.05561 (2024) - Nick Feng, Alan J. Hu, Sam Bayless, Syed M. Iqbal, Patrick Trentin, Mike Whalen, Lee Pike, John Backes:
DRAT Proofs of Unsatisfiability for SAT Modulo Monotonic Theories. CoRR abs/2401.10703 (2024) - Wenhao Wang, Muhammad Ahmad Kaleem, Adam Dziedzic, Michael Backes, Nicolas Papernot, Franziska Boenisch:
Memorization in Self-Supervised Learning Improves Downstream Generalization. CoRR abs/2401.12233 (2024) - Junjie Chu, Zeyang Sha, Michael Backes, Yang Zhang:
Conversation Reconstruction Attack Against GPT Models. CoRR abs/2402.02987 (2024) - Junjie Chu, Yugeng Liu, Ziqing Yang, Xinyue Shen, Michael Backes, Yang Zhang:
Comprehensive Assessment of Jailbreak Attacks Against LLMs. CoRR abs/2402.05668 (2024) - Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization. CoRR abs/2402.09179 (2024) - Yiyong Liu, Rui Wen, Michael Backes, Yang Zhang:
Efficient Data-Free Model Stealing with Label Diversity. CoRR abs/2404.00108 (2024) - Yiting Qu, Xinyue Shen, Yixin Wu, Michael Backes, Savvas Zannettou, Yang Zhang:
UnsafeBench: Benchmarking Image Safety Classifiers on Real-World and AI-Generated Images. CoRR abs/2405.03486 (2024) - Yixin Wu, Xinlei He, Pascal Berrang, Mathias Humbert, Michael Backes, Neil Zhenqiang Gong, Yang Zhang:
Link Stealing Attacks Against Inductive Graph Neural Networks. CoRR abs/2405.05784 (2024) - Xaver Fabian, Marco Patrignani, Marco Guarnieri, Michael Backes:
Do You Even Lift? Strengthening Compiler Security Guarantees Against Spectre Attacks. CoRR abs/2405.10089 (2024) - Xinyue Shen, Yixin Wu, Michael Backes, Yang Zhang:
Voice Jailbreak Attacks Against GPT-4o. CoRR abs/2405.19103 (2024) - Ziqing Yang, Michael Backes, Yang Zhang, Ahmed Salem:
SOS! Soft Prompt Attack Against Open-Source Large Language Models. CoRR abs/2407.03160 (2024) - Wai Man Si, Michael Backes, Yang Zhang:
ICLGuard: Controlling In-Context Learning Behavior for Applicability Authorization. CoRR abs/2407.06955 (2024) - Boyang Zhang, Yicong Tan, Yun Shen, Ahmed Salem, Michael Backes, Savvas Zannettou, Yang Zhang:
Breaking Agents: Compromising Autonomous LLM Agents Through Malfunction Amplification. CoRR abs/2407.20859 (2024) - Minxing Zhang, Ahmed Salem, Michael Backes, Yang Zhang:
Vera Verto: Multimodal Hijacking Attack. CoRR abs/2408.00129 (2024) - 2023
- Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A. Álvarez:
Adversarial vulnerability bounds for Gaussian process classification. Mach. Learn. 112(3): 971-1009 (2023) - Jimmy Shapopi, Anton Limbo, Michael Backes:
Namibia's first high performance computer. South Afr. Comput. J. 35(1) (2023) - Giorgio Di Tizio, Patrick Speicher, Milivoj Simeonovski, Michael Backes, Ben Stock, Robert Künnemann:
Pareto-optimal Defenses for the Web Infrastructure: Theory and Practice. ACM Trans. Priv. Secur. 26(2): 18:1-18:36 (2023)
skipping 476 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-08 05:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint