Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
Efficient Clustering on Encrypted Data:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
6
martFL: Enabling Utility-Driven Data Marketplace with a Rob..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
8
Robust Multi-tab Website Fingerprinting Attacks in the Wild:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
10
Learning from Limited Heterogeneous Training Data: Meta-Lea..:
, In:
?
Proceedings of the ACM Web Conference 2023 ,
11
Provenance of Training without Training Data: Towards Priva..:
, In:
?
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis ,
12
iSyn: Semi-automated Smart Contract Synthesis from Legal Fi..:
, In:
?
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies ,
14