Search for persons
X
?
Lecture Notes in Computer Science; Information Security ,
1
Load-and-Act: Increasing Page Coverage of Web Applications:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
2
Poster: Fooling XAI with Explanation-Aware Backdoors:
, In:
?
Proceedings of the 2023 ACM on Internet Measurement Conference ,
4
On the Similarity of Web Measurements Under Different Exper..:
, In:
?
2023 IEEE Symposium on Security and Privacy (SP) ,
5
Disguising Attacks with Explanation-Aware Backdoors:
, In:
?
2023 IEEE/CVF Winter Conference on Applications of Computer Vision (WACV) ,
6
Randomness is the Root of All Evil: More Reliable Evaluatio..:
, In:
?
2022 IEEE International Conference on Big Data (Big Data) ,
7
to Protect the Public Opinion Against New Types of Bots?:
, In:
?
Proceedings of the ACM Web Conference 2022 ,
8
Reproducibility and Replicability of Web Measurement Studie:
, In:
?
Annual Computer Security Applications Conference ,
9
LaserShark: Establishing Fast, Bidirectional Communication ..:
, In:
?
Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society ,
10
Plausible Deniability for Anonymous Communication:
, In:
?
Proceedings of the 14th European Workshop on Systems Security ,
11
TagVet : Vetting Malware Tags using Explainable Machine ..:
, In:
?
Proceedings of the 13th European workshop on Systems Security ,
12
What's all that noise : analysis and detection of propag..:
, In:
?
2020 IEEE European Symposium on Security and Privacy (EuroS&P) ,
14
Evaluating Explanation Methods for Deep Learning in Securit:
, In:
?
Proceedings of the 13th European workshop on Systems Security ,
15