Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Membership Inferences on Well-Generalized Learning Models., , , , , , , and . CoRR, (2018)Utilizing de Bruijn graph of metagenome assembly for metatranscriptome analysis., and . CoRR, (2015)A computational approach toward label-free protein quantification using predicted peptide detectability., , , , , , , and . ISMB (Supplement of Bioinformatics), page 481-488. (2006)Learning your identity and disease from research papers: information leaks in genome wide association study., , , , and . ACM Conference on Computer and Communications Security, page 534-544. ACM, (2009)Towards Fair Cross-Domain Adaptation via Generative Learning., , , , and . CoRR, (2020)Practical and Efficient in-Enclave Verification of Privacy Compliance., , , , , , , , , and . DSN, page 413-425. IEEE, (2021)Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX., , , , , , , and . CCS, page 2421-2434. ACM, (2017)Protein Domain Embeddings for Fast and Accurate Similarity Search., , and . RECOMB, volume 14758 of Lecture Notes in Computer Science, page 421-424. Springer, (2024)FairFix: Enhancing Fairness of Pre-Trained Deep Neural Networks with Scarce Data Resources., , , , , , , , , and 3 other author(s). IDS, page 14-20. IEEE, (2024)Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning., , , , , , , and . USENIX Security Symposium, page 3529-3545. USENIX Association, (2023)