Search for persons
X
?
Proceedings of the 21st International Conference on Mining Software Repositories ,
1
Keep Me Updated: An Empirical Study on Embedded Javascript ..:
, In:
?
Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2023 ,
2
Obfuscating Evasive Decision Trees:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
3
Mostree: Malicious Secure Private Decision Tree Evaluation ..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
4
CryptoMask: Privacy-Preserving Face Recognition:
, In:
?
Proceedings of the 35th Australian Computer-Human Interaction Conference ,
5
A Large-Scale Study of Device and Link Presentation in Emai..:
, In:
?
ICC 2023 - IEEE International Conference on Communications ,
6
Selective Encryption Framework for Securing Communication i..:
, In:
?
2023 IEEE Symposium on Computers and Communications (ISCC) ,
7
AppBox: A Black-Box Application Sandboxing Technique for Mo..:
, In:
?
Proceedings of the 9th ACM Cyber-Physical System Security Workshop ,
8
Preventing Reverse Engineering of Control Programs in Indus..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
9
EnclaveTree : Privacy-preserving Data Stream Training an..:
, In:
?
2022 9th International Conference on Dependable Systems and Their Applications (DSA) ,
10
Automated Security-focused Network Configuration Management..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
11
Scalable Private Decision Tree Evaluation with Sublinear Co..:
, In:
?
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) ,
12
We Can Make Mistakes: Fault-tolerant Forward Private Verifi..:
, In:
?
Proceedings of the 36th Annual ACM Symposium on Applied Computing ,
13
Session details: Theme: Distributed systems: DADS - Dependa..:
, In:
?
Proceedings of the 35th Annual ACM Symposium on Applied Computing ,
14
Session details: Theme: Distributed systems: DADS - Dependa..:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
15