Asokan, N.
677  results:
Search for persons X
?
2

A User-centered Security Evaluation of Copilot:

, In: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering,
 
?
3

A User-Centered Security Evaluation of Copilot:

, In: 2024 IEEE/ACM 46th International Conference on Software Engineering (ICSE),
Asare, Owura ; Asokan, N. ; Nagappan, Meiyappan - p. 1947-1957 , 2024
 
?
5

Data-Oblivious ML Accelerators Using Hardware Security Exte..:

, In: 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST),
 
?
7

Model Stealing Attacks and Defenses: Where Are We Now?:

, In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security,
Asokan, N. - p. 327 ff. , 2023
 
?
9

Pityriasis rosea sparing patches of tinea versicolor as ana..:

Sulaiman, Samna ; Prathap, Priya ; Asokan, N.
Indian Journal of Microbiology Research.  10 (2023)  2 - p. 114-115 , 2023
 
?
11

Parallel and Asynchronous Smart Contract Execution:

Liu, Jian ; Li, Peilun ; Cheng, Raymond..
IEEE Transactions on Parallel and Distributed Systems.  33 (2022)  5 - p. 1097-1108 , 2022
 
?
12

On the Effectiveness of Dataset Watermarking:

, In: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics,
Atli Tekgul, Buse Gul ; Asokan, N. - p. 93-99 , 2022
 
?
13

Real-Time Adversarial Perturbations Against Deep Reinforcem..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
 
?
14

Towards cryptographically-authenticated in-memory data stru..:

, In: 2022 IEEE Secure Development Conference (SecDev),
 
1-15