Search for persons
X
?
2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) ,
2
Demo: P4 Based In-network ML with Federated Learning to Sec..:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
4
SoK: False Information, Bots and Malicious Campaigns: Demys..:
, In:
?
2024 IEEE Security and Privacy Workshops (SPW) ,
5
Poster: Towards Privacy-Preserving Federated Recommendation..:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
6
VLIA: Navigating Shadows with Proximity for Highly Accurate..:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
8
Make out like a (Multi-Armed) Bandit: Improving the Odds of..:
, In:
?
10
Blockchains: A Handbook on Fundamentals, Platforms and Appl..
Advances in Information Security, 105
?
Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes ,
12
Honeyfile Camouflage: Hiding Fake Files in Plain Sight:
, In:
?
2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops) ,
14
Domain Invariant Driving Behaviour Prediction Based on Auto..:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
15