Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization., , , , and . ACM Conference on Computer and Communications Security, page 508-524. ACM, (2018)DL2: Training and Querying Neural Networks with Logic., , , , , and . ICML, volume 97 of Proceedings of Machine Learning Research, page 1931-1941. PMLR, (2019)Optimal Learning of Specifications from Examples., , and . CoRR, (2016)Synthesis with Abstract Examples., , and . CAV (1), volume 10426 of Lecture Notes in Computer Science, page 254-278. Springer, (2017)One Pixel Adversarial Attacks via Sketched Programs., and . Proc. ACM Program. Lang., 7 (PLDI): 1970-1994 (2023)Deep Learning Robustness Verification for Few-Pixel Attacks., , and . Proc. ACM Program. Lang., 7 (OOPSLA1): 434-461 (April 2023)Verification of Neural Networks' Global Robustness., and . CoRR, (2024)Verification of Neural Networks' Local Differential Classification Privacy., , , and . VMCAI (2), volume 14500 of Lecture Notes in Computer Science, page 98-123. Springer, (2024)Securify: Practical Security Analysis of Smart Contracts., , , , , and . ACM Conference on Computer and Communications Security, page 67-82. ACM, (2018)ExcUseMe: Asking Users to Help in Item Cold-Start Recommendations., , , , , and . RecSys, page 83-90. ACM, (2015)