Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proof of Luck: an Efficient Blockchain Consensus Protocol., , , and . IACR Cryptology ePrint Archive, (2017)Proof of Luck: an Efficient Blockchain Consensus Protocol., , , and . SysTEX@Middleware, page 2:1-2:6. ACM, (2016)Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms., , , and . ECCV (12), volume 11216 of Lecture Notes in Computer Science, page 158-174. Springer, (2018)Exploring the Space of Black-box Attacks on Deep Neural Networks., , , and . CoRR, (2017)Characterizing Attacks on Deep Reinforcement Learning., , , , , , , , and . CoRR, (2019)Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts., , , , , , , , and . EuroS&P, page 185-200. IEEE, (2019)Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong., , , , and . CoRR, (2017)Do I Get the Privacy I Need? Benchmarking Utility in Differential Privacy Libraries., , , , , and . CoRR, (2021)Adversarial Example Defense: Ensembles of Weak Defenses are not Strong., , , , and . WOOT, USENIX Association, (2017)Spatially Transformed Adversarial Examples., , , , , and . ICLR (Poster), OpenReview.net, (2018)