Gunter, Carl A.
~ 900  Ergebnisse:
Personensuche X
?
2

The HandyTech's Coming Between 1 and 4: Privacy Opportuniti..:

, In: Proceedings of the 22nd Workshop on Privacy in the Electronic Society,
Anthony, Denise ; Gunter, Carl A. ; He, Weijia... - p. 129-134 , 2023
 
?
4

EDoG: Adversarial Edge Detection For Graph Neural Networks:

, In: 2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML),
Xu, Xiaojun ; Wang, Hanzhang ; Lal, Alok.. - p. 291-305 , 2023
 
?
5

A Tagging Solution to Discover IoT Devices in Apartments:

, In: Proceedings of the 39th Annual Computer Security Applications Conference,
 
?
6

Detecting AI Trojans Using Meta Neural Analysis:

, In: 2021 IEEE Symposium on Security and Privacy (SP),
Xu, Xiaojun ; Wang, Qi ; Li, Huichen... - p. 103-120 , 2021
 
?
7

A Hypothesis Testing Approach to Sharing Logs with Confiden..:

, In: Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy,
Long, Yunhui ; Xu, Le ; Gunter, Carl A. - p. 307-318 , 2020
 
?
8

A Pragmatic Approach to Membership Inferences on Machine Le..:

, In: 2020 IEEE European Symposium on Security and Privacy (EuroS&P),
Long, Yunhui ; Wang, Lei ; Bu, Diyue... - p. 521-534 , 2020
 
?
9

WSEmail: An architecture and system for secure Internet mes..:

May, Michael J. ; Lux, Kevin D. ; Gunter, Carl A.
Service Oriented Computing and Applications.  14 (2020)  1 - p. 5-17 , 2020
 
?
10

Charting the Attack Surface of Trigger-Action IoT Platforms:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
Wang, Qi ; Datta, Pubali ; Yang, Wei... - p. 1439-1453 , 2019
 
?
11

BEEER : distributed record and replay for medical device..:

, In: Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security,
 
?
12

NRF : A Naive Re-identification Framework:

, In: Proceedings of the 2018 Workshop on Privacy in the Electronic Society,
 
?
13

ReSPonSe : Real-time, Secure, and Privacy-aware Video Re..:

, In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services,
Chen, Bo ; Nahrstedt, Klara ; Gunter, Carl - p. 39-48 , 2018
 
?
15

Property Inference Attacks on Fully Connected Neural Networ..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Ganju, Karan ; Wang, Qi ; Yang, Wei.. - p. 619-633 , 2018
 
1-15