Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fundamental Limits of Invisible Flow Fingerprinting., , , and . IEEE Trans. Inf. Forensics Secur., (2020)Leveraging Prior Knowledge Asymmetries in the Design of Location Privacy-Preserving Mechanisms., , , , and . IEEE Wirel. Commun. Lett., 9 (11): 2005-2009 (2020)Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning., , and . IEEE Symposium on Security and Privacy, page 739-753. IEEE, (2019)Covert communications on Poisson packet channels., , , and . Allerton, page 1046-1052. IEEE, (2015)ProxyGPT: Enabling Anonymous Queries in AI Chatbots with (Un)Trustworthy Browser Proxies., , , and . CoRR, (2024)OSLO: One-Shot Label-Only Membership Inference Attacks., , , and . CoRR, (2024)Manipulating the Byzantine: Optimizing Model Poisoning Attacks and Defenses for Federated Learning., and . NDSS, The Internet Society, (2021)CloudTransport: Using Cloud Storage for Censorship-Resistant Networking., , and . Privacy Enhancing Technologies, volume 8555 of Lecture Notes in Computer Science, page 1-20. Springer, (2014)Realistic Website Fingerprinting By Augmenting Network Traces., , and . CCS, page 1035-1049. ACM, (2023)Robust Adversarial Attacks Against DNN-Based Wireless Communication Systems., , , , and . CCS, page 126-140. ACM, (2021)