Personensuche
X
?
2022 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) ,
1
Connected Reconfiguration of Polyominoes Amid Obstacles usi..:
, In:
?
2020 IEEE International Conference on Robotics and Automation (ICRA) ,
2
Targeted Drug Delivery: Algorithmic Methods for Collecting ..:
, In:
?
2022 Joint Conference of the European Frequency and Time Forum and IEEE International Frequency Control Symposium (EFTF/IFCS) ,
3
Fiber Optic Time Transfer from UTC(k) to a VLBI Antenna in ..:
, In:
?
Annual Computer Security Applications Conference ,
4
LaserShark: Establishing Fast, Bidirectional Communication ..:
, In:
?
Proceedings of the 14th European Workshop on Systems Security ,
5
TagVet : Vetting Malware Tags using Explainable Machine ..:
, In:
?
Proceedings of the 13th European workshop on Systems Security ,
6
What's all that noise : analysis and detection of propag..:
, In:
?
2020 IEEE European Symposium on Security and Privacy (EuroS&P) ,
7
Evaluating Explanation Methods for Deep Learning in Securit:
, In:
?
2019 IEEE International Conference on Data Mining (ICDM) ,
8
A Wasserstein Subsequence Kernel for Time Series:
, In:
?
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society ,
9
State of the Sandbox : Investigating macOS Application S..:
, In:
?
Proceedings of the 14th International Conference on Availability, Reliability and Security ,
10
Thieves in the Browser : Web-based Cryptojacking in the ..:
, In:
?
2017 IEEE European Symposium on Security and Privacy (EuroS&P) ,
11
Privacy Threats through Ultrasonic Side Channels on Mobile ..:
, In:
?
Proceedings of the 10th European Workshop on Systems Security ,
12
Looking Back on Three Years of Flash-based Malware:
, In:
?
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security ,
13
Automatically Inferring Malware Signatures for Anti-Virus A..:
, In:
?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ,
14
Twice the Bits, Twice the Trouble : Vulnerabilities Indu..:
, In:
?
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop ,
15