Search for persons
X
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
1
VulMAE: Graph Masked Autoencoders for Vulnerability Detecti..:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
2
Securing Smart Vehicles Through Federated Learning:
, In:
?
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy ,
3
Confidential Execution of Deep Learning Inference at the Un..:
, In:
?
Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses ,
4
Renewable Just-In-Time Control-Flow Integrity:
, In:
?
2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) ,
5
A Federated Approach for Learning from Electronic Health Re..:
, In:
?
2022 IEEE 8th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS) ,
6
SentMod: Hidden Backdoor Attack on Unstructured Textual Dat:
, In:
?
Lecture Notes in Computer Science; Data and Applications Security and Privacy XXXVI ,
7
MCoM: A Semi-Supervised Method for Imbalanced Tabular Secur..:
, In:
?
The 21st ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems ,
12
Exploiting the Trust Between Boundaries : Discovering Me..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
13
FEAST'20: Fifth Workshop on Forming an Ecosystem Around Sof..:
, In:
?
Proceedings of the 3rd ACM Workshop on Forming an Ecosystem Around Software Transformation ,
15