Search for persons
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
1
Those Aren't Your Memories, They're Somebody Else's: Seedin..:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
3
On mission Twitter Profiles: A Study of Selective Toxic Beh..:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
4
Exploring the Distinctive Tweeting Patterns of Toxic Twitte..:
, In:
?
Security and Artificial Intelligence; Lecture Notes in Computer Science ,
7
Deep Learning Backdoors:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
8
Hidden Backdoors in Human-Centric Language Models:
, In:
?
2021 IEEE European Symposium on Security and Privacy (EuroS&P) ,
9
On the (In)Feasibility of Attribute Inference Attacks on Ma..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
10
Oriole: Thwarting Privacy Against Trustworthy Deep Learning..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop ,
13
Not one but many Tradeoffs : Privacy Vs. Utility in Diff..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
14