Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formulaic composition in the blues: A view from the field., and . JOURNAL OF AMERICAN FOLKLORE, 120 (478): 482--499 (2007)120; 120.Flexible Policy directed code safety, and . Proceedings of the 1999 IEEE conference on Security and Privacy, (1999)Secure aggregation for wireless networks, and . Workshop on Security and Assurance in Ad hoc Networks, (2003)On Staleness and the Delivery of Web Pages., , and . Inf. Syst. Frontiers, 5 (2): 129-136 (2003)Efficient Dynamic Searchable Encryption with Forward Privacy., , , and . CoRR, (2017)Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks., , and . CoRR, (2017)Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates., , and . IACR Cryptology ePrint Archive, (2014)Feature Squeezing Mitigates and Detects Carlini/Wagner Adversarial Examples., , and . CoRR, (2017)Inculcating invariants in introductory courses., and . ICSE, page 673-678. ACM, (2006)Using Real-Time Road Traffic Data to Evaluate Congestion., , , , , and . Dependable and Historic Computing, volume 6875 of Lecture Notes in Computer Science, page 93-117. Springer, (2011)