Author of the publication

Data-Confined HTML5 Applications.

, , , , and . ESORICS, volume 8134 of Lecture Notes in Computer Science, page 736-754. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Black-Box Attacks on Deep Neural Networks Using Efficient Query Mechanisms., , , and . ECCV (12), volume 11216 of Lecture Notes in Computer Science, page 158-174. Springer, (2018)Proof of Luck: an Efficient Blockchain Consensus Protocol., , , and . SysTEX@Middleware, page 2:1-2:6. ACM, (2016)Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts., , , , , , , , and . EuroS&P, page 185-200. IEEE, (2019)Adversarial Example Defense: Ensembles of Weak Defenses are not Strong., , , , and . WOOT, USENIX Association, (2017)Spatially Transformed Adversarial Examples., , , , , and . ICLR (Poster), OpenReview.net, (2018)Adaptive and Diverse Techniques for Generating Adversarial Examples.. University of California, Berkeley, USA, (2018)base-search.net (ftcdlib:qt7jb8w89b).Generating Adversarial Examples with Adversarial Networks., , , , , and . IJCAI, page 3905-3911. ijcai.org, (2018)Black-box Attacks on Deep Neural Networks via Gradient Estimation., , , and . ICLR (Workshop), OpenReview.net, (2018)Unified Power Frequency Model Framework., , , , , and . ISLPED, page 174-179. ACM, (2016)Decision Boundary Analysis of Adversarial Examples., , and . ICLR (Poster), OpenReview.net, (2018)