From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

When the Curious Abandon Honesty: Federated Learning Is Not Private., , , , , и . CoRR, (2021)DroidDisintegrator: Intra-Application Information Flow Control in Android Apps., и . AsiaCCS, стр. 401-412. ACM, (2016)You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion., , , и . CoRR, (2020)Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels., , , и . IEEE Symposium on Security and Privacy, стр. 853-869. IEEE, (2019)Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation., , , , , и . EuroS&P, стр. 241-257. IEEE, (2023)Lend Me Your Ear: Passive Remote Physical Side Channels on PCs., , , и . USENIX Security Symposium, стр. 4437-4454. USENIX Association, (2022)Beauty and the Burst: Remote Identification of Encrypted Video Streams., , и . USENIX Security Symposium, стр. 1357-1374. USENIX Association, (2017)Data-Oriented Systems Security. Tel Aviv University, Israel, (2021)Tel Aviv University Library.Understanding Transformer Memorization Recall Through Idioms., , , , , и . EACL, стр. 248-264. Association for Computational Linguistics, (2023)Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help., , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (1): 25:1-25:25 (2022)