Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks., , , and . CCS, page 3266-3281. ACM, (2021)Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning., , , , , and . CCS, page 1212-1226. ACM, (2023)Machine Learning-Assisted E-jet Printing of Organic Flexible Biosensors., , , , , , and . CoRR, (2021)CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 736-752 (2021)AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks., , and . ACM J. Emerg. Technol. Comput. Syst., 19 (1): 7:1-7:20 (January 2023)RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression., , , and . NDSS, The Internet Society, (2023)AutoRank: Automated Rank Selection for Effective Neural Network Customization., , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 11 (4): 611-619 (2021)Trojan Signatures in DNN Weights., , , , and . ICCVW, page 12-20. IEEE, (2021)Assured deep learning: practical defense against adversarial attacks., , , , and . ICCAD, page 20. ACM, (2018)SWNet: Small-World Neural Networks and Rapid Convergence., , and . CoRR, (2019)