Rieck, Christian
19  Ergebnisse:
Personensuche X
?
1

Connected Reconfiguration of Polyominoes Amid Obstacles usi..:

, In: 2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS),
Garcia, Javier ; Yannuzzi, Michael ; Kramer, Peter.. - p. 6554-6560 , 2022
 
?
2

Targeted Drug Delivery: Algorithmic Methods for Collecting ..:

, In: 2020 IEEE International Conference on Robotics and Automation (ICRA),
Becker, Aaron T. ; Fekete, Sandor P. ; Huang, Li... - p. 2508-2514 , 2020
 
?
3

Fiber Optic Time Transfer from UTC(k) to a VLBI Antenna in ..:

, In: 2022 Joint Conference of the European Frequency and Time Forum and IEEE International Frequency Control Symposium (EFTF/IFCS),
 
?
4

LaserShark: Establishing Fast, Bidirectional Communication ..:

, In: Annual Computer Security Applications Conference,
 
?
5

TagVet : Vetting Malware Tags using Explainable Machine ..:

, In: Proceedings of the 14th European Workshop on Systems Security,
 
?
6

What's all that noise : analysis and detection of propag..:

, In: Proceedings of the 13th European workshop on Systems Security,
 
?
7

Evaluating Explanation Methods for Deep Learning in Securit:

, In: 2020 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
8

A Wasserstein Subsequence Kernel for Time Series:

, In: 2019 IEEE International Conference on Data Mining (ICDM),
 
?
9

State of the Sandbox : Investigating macOS Application S..:

, In: Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society,
 
?
10

Thieves in the Browser : Web-based Cryptojacking in the ..:

, In: Proceedings of the 14th International Conference on Availability, Reliability and Security,
 
?
11

Privacy Threats through Ultrasonic Side Channels on Mobile ..:

, In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
12

Looking Back on Three Years of Flash-based Malware:

, In: Proceedings of the 10th European Workshop on Systems Security,
 
?
13

Automatically Inferring Malware Signatures for Anti-Virus A..:

, In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security,
 
?
14

Twice the Bits, Twice the Trouble : Vulnerabilities Indu..:

, In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security,
 
?
15

Poisoning behavioral malware clustering:

, In: Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop,
Biggio, Battista ; Rieck, Konrad ; Ariu, Davide... - p. 27-36 , 2014
 
1-15