Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
3
Efficient Clustering on Encrypted Data:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
8
Learning from Limited Heterogeneous Training Data: Meta-Lea..:
, In:
?
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis ,
9
iSyn: Semi-automated Smart Contract Synthesis from Legal Fi..:
, In:
?
Proceedings of the ACM Web Conference 2023 ,
10
Provenance of Training without Training Data: Towards Priva..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
11
Robust Multi-tab Website Fingerprinting Attacks in the Wild:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
12
martFL: Enabling Utility-Driven Data Marketplace with a Rob..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
13