Search for persons
X
?
Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes ,
1
On the Correlation Between Deepfake Detection Performance a..:
, In:
?
2024 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) ,
2
An Approach on Improving the Recommender System: Predicting..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2023 ,
4
PHI: Pseudo-HAL Identification for Scalable Firmware Fuzzin:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
7
Robust Training for Deepfake Detection Models Against Disru..:
, In:
?
Proceedings of the ACM Web Conference 2023 ,
9
ZTLS: A DNS-based Approach to Zero Round Trip Delay in TLS ..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
10
Towards Constructing Consistent Pattern Strength Meters wit..:
, In:
?
Information Security Applications; Lecture Notes in Computer Science ,
12
On Membership Inference Attacks to Generative Language Mode..:
, In:
?
Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022 ,
13
Differential Testing of Cryptographic Libraries with Hybrid..:
, In:
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
14