From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Certified Robustness to Adversarial Examples with Differential Privacy., , , , и . IEEE Symposium on Security and Privacy, стр. 656-672. IEEE, (2019)Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts., и . HotOS, USENIX Association, (2015)DeepXplore: Automated Whitebox Testing of Deep Learning Systems., , , и . GetMobile, 22 (3): 36-38 (2018)DeepXplore: Automated Whitebox Testing of Deep Learning Systems., , , и . SOSP, стр. 1-18. ACM, (2017)Learning Security Classifiers with Verified Global Robustness Properties., , , , , и . CCS, стр. 477-494. ACM, (2021)MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation., , и . USENIX Security Symposium, стр. 729-743. USENIX Association, (2018)Formal Security Analysis of Neural Networks using Symbolic Intervals., , , , и . USENIX Security Symposium, стр. 1599-1614. USENIX Association, (2018)Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers., , , , , , и . USENIX Security Symposium, стр. 415-430. USENIX Association, (2013)XDA: Accurate, Robust Disassembly with Transfer Learning., , , , и . NDSS, The Internet Society, (2021)Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks., , и . NDSS, The Internet Society, (2014)