Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Covert communications on Poisson packet channels., , , and . Allerton, page 1046-1052. IEEE, (2015)CloudTransport: Using Cloud Storage for Censorship-Resistant Networking., , and . Privacy Enhancing Technologies, volume 8555 of Lecture Notes in Computer Science, page 1-20. Springer, (2014)Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning., and . NDSS, The Internet Society, (2021)OSLO: One-Shot Label-Only Membership Inference Attacks., , , and . CoRR, (2024)ProxyGPT: Enabling Anonymous Queries in AI Chatbots with (Un)Trustworthy Browser Proxies., , , and . CoRR, (2024)Fake or Compromised? Making Sense of Malicious Clients in Federated Learning., , and . ESORICS (1), volume 14982 of Lecture Notes in Computer Science, page 187-207. Springer, (2024)Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms., , , , and . IEEE Wirel. Commun. Lett., 9 (11): 2005-2009 (2020)Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems., , , , and . CCS, page 126-140. ACM, (2021)Realistic Website Fingerprinting By Augmenting Network Traces., , and . CCS, page 1035-1049. ACM, (2023)Fundamental Limits of Invisible Flow Fingerprinting., , , and . IEEE Trans. Inf. Forensics Secur., (2020)