Personensuche
X
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
3
DISCO: Dynamic Searchable Encryption with Constant State:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
4
On Practicality of Using ARM TrustZone Trusted Execution En..:
, In:
?
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) ,
5
Towards Automated Generation of Smart Grid Cyber Range for ..:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
7
Mostree: Malicious Secure Private Decision Tree Evaluation ..:
, In:
?
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ,
9
Poisoning Online Learning Filters by Shifting on the Move:
, In:
?
2023 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT) ,
10
End-to-End Performance Evaluation of R-SV / R-GOOSE Message..:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
12
Mitigating Adversarial Attacks by Distributing Different Co..:
, In:
?
Proceedings of the 31st ACM International Conference on Multimedia ,
13
DeNoL: A Few-Shot-Sample-Based Decoupling Noise Layer for C..:
, In:
?
2023 IEEE/CVF International Conference on Computer Vision (ICCV) ,
14
Tracing the Origin of Adversarial Attack for Forensic Inves..:
, In:
?
Australasian Computing Education Conference ,
15