Search for persons
X
?
Proceedings of the 21st International Conference on Mining Software Repositories ,
3
Keep Me Updated: An Empirical Study on Embedded Javascript ..:
, In:
?
Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2023 ,
4
Obfuscating Evasive Decision Trees:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
5
Mostree: Malicious Secure Private Decision Tree Evaluation ..:
, In:
?
Proceedings of the 35th Australian Computer-Human Interaction Conference ,
8
A Large-Scale Study of Device and Link Presentation in Emai..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
9
CryptoMask: Privacy-Preserving Face Recognition:
, In:
?
Proceedings of the 9th ACM Cyber-Physical System Security Workshop ,
14
Preventing Reverse Engineering of Control Programs in Indus..:
, In:
?
2023 IEEE Symposium on Computers and Communications (ISCC) ,
15