Search for persons
X
?
2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
1
Randomness is the Root of All Evil: More Reliable Evaluatio..:
, In:
?
Lecture Notes in Computer Science; Information Security ,
3
Load-and-Act: Increasing Page Coverage of Web Applications:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
4
Poster: Fooling XAI with Explanation-Aware Backdoors:
, In:
?
Proceedings of the 2023 ACM on Internet Measurement Conference ,
5
On the Similarity of Web Measurements Under Different Exper..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
6
Disguising Attacks with Explanation-Aware Backdoors:
, In:
?
2022 IEEE International Conference on Big Data (Big Data) ,
7
to Protect the Public Opinion Against New Types of Bots?:
, In:
?
Proceedings of the ACM Web Conference 2022 ,
8
Reproducibility and Replicability of Web Measurement Studie:
, In:
?
Proceedings of the 14th European Workshop on Systems Security ,
9
TagVet : Vetting Malware Tags using Explainable Machine ..:
, In:
?
Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society ,
10
Plausible Deniability for Anonymous Communication:
, In:
?
Annual Computer Security Applications Conference ,
11
LaserShark: Establishing Fast, Bidirectional Communication ..:
, In:
?
2020 IEEE European Symposium on Security and Privacy (EuroS&P) ,
12
Evaluating Explanation Methods for Deep Learning in Securit:
, In:
?
Proceedings of the 13th European workshop on Systems Security ,
13
Aim low, shoot high : evading aimbot detectors by mimick..:
, In:
?
Proceedings of the 13th European workshop on Systems Security ,
15