Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks., , and . CNS, page 1-9. IEEE, (2020)Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership., , , , and . TrustCom/BigDataSE, page 1885-1890. IEEE, (2018)Detection of global, metamorphic malware variants using control and data flow analysis., , , , and . MILCOM, page 1-6. IEEE, (2012)A Practical Method and Tool for Systems Engineering of Service-Oriented Applications., , and . WISE, volume 4831 of Lecture Notes in Computer Science, page 472-483. Springer, (2007)Cryptographic Password Obfuscation., , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 497-512. Springer, (2018)Practical implementations of program obfuscators for point functions., , , , , and . HPCS, page 460-467. IEEE, (2016)Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation., , , , , and . CCSW, page 167. ACM, (2020)Practical Implementation of Lattice-Based Program Obfuscators for Point Functions., , , , and . HPCS, page 761-768. IEEE, (2017)Encrypted-Input Obfuscation of Image Classifiers., , , , , and . DBSec, volume 12840 of Lecture Notes in Computer Science, page 136-156. Springer, (2021)Experience with a Model-Driven Approach for Enterprise-Wide Interface Specification and XML Schema Generation., , and . EDOC, page 288-295. IEEE Computer Society, (2003)