Search for persons
X
?
Proceedings of the 21st International Conference on Mining Software Repositories ,
1
Keep Me Updated: An Empirical Study on Embedded Javascript ..:
, In:
?
Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2023 ,
2
Obfuscating Evasive Decision Trees:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
3
Mostree: Malicious Secure Private Decision Tree Evaluation ..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
6
CryptoMask: Privacy-Preserving Face Recognition:
, In:
?
Proceedings of the 35th Australian Computer-Human Interaction Conference ,
7
A Large-Scale Study of Device and Link Presentation in Emai..:
, In:
?
ICC 2023 - IEEE International Conference on Communications ,
8
Selective Encryption Framework for Securing Communication i..:
, In:
?
2023 IEEE Symposium on Computers and Communications (ISCC) ,
9
AppBox: A Black-Box Application Sandboxing Technique for Mo..:
, In:
?
Proceedings of the 9th ACM Cyber-Physical System Security Workshop ,
10
Preventing Reverse Engineering of Control Programs in Indus..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
11
EnclaveTree : Privacy-preserving Data Stream Training an..:
, In:
?
2022 9th International Conference on Dependable Systems and Their Applications (DSA) ,
13
Automated Security-focused Network Configuration Management..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
14
Scalable Private Decision Tree Evaluation with Sublinear Co..:
, In:
?
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) ,
15