Search for persons
X
?
Proceedings of the 3rd ACM Workshop on the Security Implications of Deepfakes and Cheapfakes ,
2
Honeyfile Camouflage: Hiding Fake Files in Plain Sight:
, In:
?
Communications in Computer and Information Science; Data Science and Machine Learning ,
3
Text-Conditioned Graph Generation Using Discrete Graph Vari..:
, In:
?
7
New Schools and New Classmates: The Disruption and Peer Gro..
NBER working paper series, no. w30085
?
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) ,
8
Modelling direct messaging networks with multiple recipient..:
, In:
?
Communications in Computer and Information Science; Data Mining ,
9
SchemaDB: A Dataset for Structures in Relational Data:
, In:
?
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
11
Can pre-trained Transformers be used in detecting complex s..:
, In:
?
2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) ,
12