From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyzing the Interpretability Robustness of Self-Explaining Models., , и . CoRR, (2019)Data Privacy in Trigger-Action IoT Systems., , , , , и . CoRR, (2020)GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems., , , , , и . EuroS&P, стр. 664-683. IEEE, (2022)Computer Security and Privacy for the Physical World.. IoT S&P@CCS, стр. 55. ACM, (2017)CPSIoTSec'23: Fifth Workshop on CPS & IoT Security and Privacy., и . CCS, стр. 3648-3650. ACM, (2023)Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications., , и . SecDev, стр. 88-93. IEEE Computer Society, (2016)ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms., , , , , , и . NDSS, The Internet Society, (2017)Analyzing the Security of the Business Collaboration Platform App Model., , , , , и . CoRR, (2022)Anception: Application Virtualization For Android., , , и . CoRR, (2014)Invisible Perturbations: Physical Adversarial Examples Exploiting the Rolling Shutter Effect., , , , и . CVPR, стр. 14666-14675. Computer Vision Foundation / IEEE, (2021)