Rudolph, Carsten
1777  results:
Search for persons X
?
2

ALAN: Assessment-as-Learning Authentic Tasks for Networking:

, In: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1,
Minagar, Sepehr ; Sakzad, Amin ; Tack, Guido.. - p. 853-859 , 2024
 
?
3

Utilizing Large Language Models with Human Feedback Integra..:

, In: Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems,
Nguyen, Quan Hong ; Wu, Tingmin ; Nguyen, Van... - p. 35-46 , 2024
 
?
5

Generating Semantic Adversarial Examples via Feature Manipu..:

Wang, Shuo ; Chen, Shangyu ; Chen, Tianle...
IEEE Transactions on Neural Networks and Learning Systems.  , 2024
 
?
6

Towards Private Multi-operator Network Slicing:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Haydon, Blake ; Lai, Shangqi ; Yuan, Xingliang.. - p. 359-379 , 2024
 
?
8

FDIAs on Hybrid Trading Transactive Energy Markets: Attacks..:

, In: 2023 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE),
 
?
11

RAI4IoE: Responsible AI for Enabling the Internet of Energy:

, In: 2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA),
Xue, Minhui ; Nepal, Surya ; Liu, Ling... - p. 13-22 , 2023
 
?
14

Defeating Misclassification Attacks Against Transfer Learni..:

Wu, Bang ; Wang, Shuo ; Yuan, Xingliang...
IEEE Transactions on Dependable and Secure Computing.  20 (2023)  2 - p. 886-901 , 2023
 
?
15

Are We Missing the Cybersecurity Factors in Recordkeeping?:

, In: Lecture Notes in Computer Science; Information for a Better World: Normality, Virtuality, Physicality, Inclusivity,
 
1-15