Search for persons
X
?
2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) ,
1
EdgePruner: Poisoned Edge Pruning in Graph Contrastive Lear..:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
2
Compact Accountable Ring Signatures in the Plain Model:
, In:
?
Information Security and Cryptology; Lecture Notes in Computer Science ,
3
Compact Ring Signatures with Post-Quantum Security in Stand..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
4
Threshold Ring Signatures with Accountability:
, In:
?
Computer Security – ESORICS 2023; Lecture Notes in Computer Science ,
5
An Ultra-High Throughput AES-Based Authenticated Encryption..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
6
A Fault-Tolerant Content Moderation Mechanism for Secure Me..:
, In:
?
Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science ,
7
Logarithmic-Size (Linkable) Ring Signatures from Lattice Is..:
, In:
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
10
AutoRed: Automating Red Team Assessment via Strategic Think..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
12
Spherical Gaussian Leftover Hash Lemma via the Rényi Diverg..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
13
Homomorphic Signatures for Subset and Superset Mixed Predic..:
, In:
?
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography ,
15