From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Investigating Stateful Defenses Against Black-Box Adversarial Examples., , , , , и . CoRR, (2023)Unbiased Face Synthesis With Diffusion Models: Are We There Yet?, , , , и . CoRR, (2023)Scale-Adv: A Joint Attack on Image-Scaling and Machine Learning Classifiers., и . CoRR, (2021)Pipe Overflow: Smashing Voice Authentication for Fun and Profit., , , , , , и . CoRR, (2022)SkillFence: A Systems Approach to Practically Mitigating Voice-Based Confusion Attacks., , , , и . CoRR, (2022)"I Want the Payment Process to be Cool": Understanding How Interaction Factors into Security and Privacy Perception of Authentication in Virtual Reality., , , , , , , , и . CoRR, (2023)"It's up to the Consumer to be Smart": Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit., , , , , , и . SP, стр. 2850-2866. IEEE, (2023)Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems., , и . ICML, том 162 из Proceedings of Machine Learning Research, стр. 7102-7121. PMLR, (2022)Protecting Privacy of BLE Device Users., , и . USENIX Security Symposium, стр. 1205-1221. USENIX Association, (2016)Automated Cookie Notice Analysis and Enforcement., , , и . USENIX Security Symposium, стр. 1109-1126. USENIX Association, (2023)