Search for persons
X
?
2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
1
An Investigation on the Fragility of Graph Neural Networks:..:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
2
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment ..:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
3
Attack Some while Protecting Others: Selective Attack Strat..:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
4
The Queen's Guard: A Secure Enforcement of Fine-grained Acc..:
, In:
?
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy ,
7
GINN : Fast GPU-TEE Based Integrity for Neural Network T..:
, In:
?
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy ,
8
Enforcement of Laws and Privacy Preferences in Modern Compu..:
, In:
?
2022 IEEE 61st Conference on Decision and Control (CDC) ,
10