Search for persons
X
?
Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2023 ,
1
Obfuscating Evasive Decision Trees:
, In:
?
Proceedings of the 9th ACM Cyber-Physical System Security Workshop ,
3
Preventing Reverse Engineering of Control Programs in Indus..:
, In:
?
Proceedings of the 39th Annual Computer Security Applications Conference ,
4
Mostree: Malicious Secure Private Decision Tree Evaluation ..:
, In:
?
Information and Communications Security; Lecture Notes in Computer Science ,
5
CryptoMask: Privacy-Preserving Face Recognition:
, In:
?
ICC 2023 - IEEE International Conference on Communications ,
6
Selective Encryption Framework for Securing Communication i..:
, In:
?
Proceedings of the 35th Australian Computer-Human Interaction Conference ,
7
A Large-Scale Study of Device and Link Presentation in Emai..:
, In:
?
2023 IEEE Symposium on Computers and Communications (ISCC) ,
9
AppBox: A Black-Box Application Sandboxing Technique for Mo..:
, In:
?
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P) ,
10
We Can Make Mistakes: Fault-tolerant Forward Private Verifi..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
11
EnclaveTree : Privacy-preserving Data Stream Training an..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
13
Scalable Private Decision Tree Evaluation with Sublinear Co..:
, In:
?
2022 9th International Conference on Dependable Systems and Their Applications (DSA) ,
14