From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Epione: Lightweight Contact Tracing with Strong Privacy., , , , и . CoRR, (2020)Perturbation type categorization for multiple adversarial perturbation robustness., , , и . UAI, том 180 из Proceedings of Machine Learning Research, стр. 1317-1327. PMLR, (2022)Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing., , , , , , , , , и . CCS, стр. 1871-1885. ACM, (2022)Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection., , , , , и . CCS, стр. 363-376. ACM, (2017)MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs., , , и . USENIX Security Symposium, стр. 2129-2146. USENIX Association, (2020)The Secret Sharer: Evaluating and Testing Unintended Memorization in Neural Networks., , , , и . USENIX Security Symposium, стр. 267-284. USENIX Association, (2019)Privacy-Preserving Aggregation of Time-Series Data., , , , и . NDSS, The Internet Society, (2011)Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects?, , , и . NDSS, The Internet Society, (2008)CHURP: Dynamic-Committee Proactive Secret Sharing., , , , , , и . CCS, стр. 2369-2386. ACM, (2019)Opaak: using mobile phones to limit anonymous identities online., , , и . MobiSys, стр. 295-308. ACM, (2012)