Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fundamental Limits of Invisible Flow Fingerprinting., , , and . IEEE Trans. Inf. Forensics Secur., (2020)Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms., , , , and . IEEE Wirel. Commun. Lett., 9 (11): 2005-2009 (2020)Realistic Website Fingerprinting By Augmenting Network Traces., , and . CCS, page 1035-1049. ACM, (2023)Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems., , , , and . CCS, page 126-140. ACM, (2021)Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning., and . NDSS, The Internet Society, (2021)Covert Communications on Poisson Packet Channels., , , and . CoRR, (2016)Enemy At the Gateways: A Game Theoretic Approach to Proxy Distribution., , , and . CoRR, (2017)CloudTransport: Using Cloud Storage for Censorship-Resistant Networking., , and . Privacy Enhancing Technologies, volume 8555 of Lecture Notes in Computer Science, page 1-20. Springer, (2014)Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning., , and . IEEE Symposium on Security and Privacy, page 739-753. IEEE, (2019)OSLO: One-Shot Label-Only Membership Inference Attacks., , , and . CoRR, (2024)