Search for persons
X
?
2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML) ,
1
EdgePruner: Poisoned Edge Pruning in Graph Contrastive Lear..:
, In:
?
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy ,
3
AutoRed: Automating Red Team Assessment via Strategic Think..:
, In:
?
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
5
Membership Inference Attacks against GNN-based Hardware Tro..:
, In:
?
Communications in Computer and Information Science; Computer Vision, Imaging and Computer Graphics Theory and Applications ,
6
Influence of Errors on the Evaluation of Text Classificatio..:
, In:
?
Computational Linguistics and Intelligent Text Processing; Lecture Notes in Computer Science ,
7
Detecting Machine-Translated Paragraphs by Matching Similar..:
, In:
?
2022 IEEE 28th International Symposium on On-Line Testing and Robust System Design (IOLTS) ,
8
Effective Hardware-Trojan Feature Extraction Against Advers..:
, In:
?
Communications in Computer and Information Science; Information Systems Security and Privacy ,
9
Effects of Explanatory Information on Privacy Policy Summar..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
11
Toward Learning Robust Detectors from Imbalanced Datasets L..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
12
Countermeasures Against Backdoor Attacks Towards Malware De..:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
13
Stronger Targeted Poisoning Attacks Against Malware Detecti..:
, In:
?
Computer Security; Lecture Notes in Computer Science ,
15