Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
1
Efficient Clustering on Encrypted Data:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
2
martFL: Enabling Utility-Driven Data Marketplace with a Rob..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
3
Robust Multi-tab Website Fingerprinting Attacks in the Wild:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
4
Learning from Limited Heterogeneous Training Data: Meta-Lea..:
, In:
?
Proceedings of the ACM Web Conference 2023 ,
5
Provenance of Training without Training Data: Towards Priva..:
, In:
?
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis ,
6
iSyn: Semi-automated Smart Contract Synthesis from Legal Fi..:
, In:
?
Proceedings of the 18th International Conference on emerging Networking EXperiments and Technologies ,
7
FlowTele : remotely shaping traffic on internet-scale ne..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
8
Verifying the Quality of Outsourced Training on Clouds:
, In:
?
Proceedings of the 21st ACM Workshop on Hot Topics in Networks ,
9
DIP : unifying network layer innovations using shared L3..:
, In:
?
Proceedings of the 2022 International Conference on Management of Data ,
10
Unsupervised Contextual Anomaly Detection for Database Syst..:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
11
A Hard Label Black-box Adversarial Attack Against Graph Neu..:
, In:
?
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security ,
12
Privilege-Escalation Vulnerability Discovery for Large-scal..:
, In:
?
Annual Computer Security Applications Conference ,
13
On Detecting Growing-Up Behaviors of Malicious Accounts in ..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
14
HyperService : Interoperability and Programmability Acro..:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
15