From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

TableGAN-MCA: Evaluating Membership Collisions of GAN-Synthesized Tabular Data Releasing., , , , и . CCS, стр. 2096-2112. ACM, (2021)Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps., , , , , и . WWW, стр. 2166-2177. ACM, (2023)Towards Better ML-Based Software Services: An Investigation of Source Code Engineering Impact., , , , , и . SSE, стр. 1-10. IEEE, (2023)Towards adversarial detection of mobile malware: poster., , и . MobiCom, стр. 415-416. ACM, (2016)POSTER: ML-Compass: A Comprehensive Assessment Framework for Machine Learning Models., , , , и . AsiaCCS, стр. 1031-1033. ACM, (2023)APPCLASSIFIER: Automated App Inference on Encrypted Traffic via Meta Data Analysis., , , и . GLOBECOM, стр. 1-7. IEEE, (2018)On the Impact of Location Errors on Localization Attacks in Location-Based Social Network Services., , , и . SpaCCS, том 10066 из Lecture Notes in Computer Science, стр. 343-357. (2016)An Explainability-Guided Testing Framework for Robustness of Malware Detectors., , , , , , , , и . (августа 2023)On Security Weaknesses and Vulnerabilities in Deep Learning Systems., , , , , и . CoRR, (2024)DeepTheft: Stealing DNN Model Architectures through Power Side Channel., , , , , , , , и . CoRR, (2023)