Search for persons
X
?
Proceedings of the 15th ACM Web Science Conference 2023 ,
1
A longitudinal study of the top 1% toxic Twitter profiles:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
2
Those Aren't Your Memories, They're Somebody Else's: Seedin..:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
4
On mission Twitter Profiles: A Study of Selective Toxic Beh..:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
5
Exploring the Distinctive Tweeting Patterns of Toxic Twitte..:
, In:
?
Security and Artificial Intelligence; Lecture Notes in Computer Science ,
8
Deep Learning Backdoors:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
9
Hidden Backdoors in Human-Centric Language Models:
, In:
?
2021 IEEE European Symposium on Security and Privacy (EuroS&P) ,
10
On the (In)Feasibility of Attribute Inference Attacks on Ma..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
11
Oriole: Thwarting Privacy Against Trustworthy Deep Learning..:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop ,
14
Not one but many Tradeoffs : Privacy Vs. Utility in Diff..:
, In:
?
Information Security and Privacy; Lecture Notes in Computer Science ,
15