Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning., , , , , and . CCS, page 1212-1226. ACM, (2023)COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks., , , and . CCS, page 3266-3281. ACM, (2021)AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks., , and . ACM J. Emerg. Technol. Comput. Syst., 19 (1): 7:1-7:20 (January 2023)Machine Learning-Assisted E-jet Printing of Organic Flexible Biosensors., , , , , , and . CoRR, (2021)AutoRank: Automated Rank Selection for Effective Neural Network Customization., , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 11 (4): 611-619 (2021)CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 736-752 (2021)Assured deep learning: practical defense against adversarial attacks., , , , and . ICCAD, page 20. ACM, (2018)RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression., , , and . NDSS, The Internet Society, (2023)Trojan Signatures in DNN Weights., , , , and . ICCVW, page 12-20. IEEE, (2021)SWNet: Small-World Neural Networks and Rapid Convergence., , and . CoRR, (2019)