From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

DroidDisintegrator: Intra-Application Information Flow Control in Android Apps., и . AsiaCCS, стр. 401-412. ACM, (2016)Situational Access Control in the Internet of Things., , и . ACM Conference on Computer and Communications Security, стр. 1056-1073. ACM, (2018)Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning., , , , , , и . USENIX Security Symposium, стр. 211-228. USENIX Association, (2023)When the Curious Abandon Honesty: Federated Learning Is Not Private., , , , , и . EuroS&P, стр. 175-199. IEEE, (2023)Toward Proactive Support for Older Adults: Predicting the Right Moment for Providing Mobile Safety Help., , , и . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 6 (1): 25:1-25:25 (2022)In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning., , , , и . CoRR, (2022)The Limitations of Stylometry for Detecting Machine-Generated Fake News., , , и . Comput. Linguistics, 46 (2): 499-510 (2020)Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning., , , и . SP, стр. 1295-1313. IEEE, (2020)In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning., , , , и . NeurIPS, (2022)De-Anonymizing Text by Fingerprinting Language Generation., , и . NeurIPS, (2020)