Personensuche
X
?
2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) ,
1
EDoG: Adversarial Edge Detection For Graph Neural Networks:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
2
A Tagging Solution to Discover IoT Devices in Apartments:
, In:
?
Proceedings of the 22nd Workshop on Privacy in the Electronic Society ,
3
The HandyTech's Coming Between 1 and 4: Privacy Opportuniti..:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
4
Detecting AI Trojans Using Meta Neural Analysis:
, In:
?
2020 IEEE European Symposium on Security and Privacy (EuroS&P) ,
5
A Pragmatic Approach to Membership Inferences on Machine Le..:
, In:
?
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy ,
6
A Hypothesis Testing Approach to Sharing Logs with Confiden..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
7
Charting the Attack Surface of Trigger-Action IoT Platforms:
, In:
?
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security ,
8
BEEER : distributed record and replay for medical device..:
, In:
?
Proceedings of the 2018 Workshop on Privacy in the Electronic Society ,
9
NRF : A Naive Re-identification Framework:
, In:
?
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services ,
10
ReSPonSe : Real-time, Secure, and Privacy-aware Video Re..:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
11
Property Inference Attacks on Fully Connected Neural Networ..:
, In:
?
Proceedings of the 33rd Annual Computer Security Applications Conference ,
12
Malware Detection in Adversarial Settings : Exploiting F..:
, In:
?
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
13
HanGuard : SDN-driven protection of smart home WiFi devi..:
, In:
?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ,
14
Leaky Cauldron on the Dark Land : Understanding Memory S..:
, In:
?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ,
15