Author of the publication

A Learning-Based Approach to Reactive Security.

, , , , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 192-206. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Validity: a framework for cross-disciplinary collaboration in mining indicators of learning from MOOC forums., , , , and . LAK, page 546-547. ACM, (2016)Machine Learning in Network Anomaly Detection: A Survey., , , , , and . IEEE Access, (2021)Predicting dynamic spectrum allocation: a review covering simulation, modelling, and prediction., , , , and . Artif. Intell. Rev., 56 (10): 10921-10959 (October 2023)A Graph Symmetrization Bound on Channel Information Leakage Under Blowfish Privacy., , , and . IEEE Trans. Inf. Theory, 68 (1): 538-548 (2022)DBA bandits: Self-driving index tuning under ad-hoc, analytical workloads with safety guarantees., , , and . CoRR, (2020)A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning., , , , and . IEEE Trans. Inf. Forensics Secur., 11 (3): 556-570 (2016)A Learning-Based Approach to Reactive Security., , , , , and . IEEE Trans. Dependable Secur. Comput., 9 (4): 482-493 (2012)Securing Cyber-Physical Systems: Physics-Enhanced Adversarial Learning for Autonomous Platoons., , , and . ECML/PKDD (3), volume 13715 of Lecture Notes in Computer Science, page 269-285. Springer, (2022)Enhancing the Antidote: Improved Pointwise Certifications against Poisoning Attacks., , , , and . AAAI, page 8861-8869. AAAI Press, (2023)Hard to Forget: Poisoning Attacks on Certified Machine Unlearning., , and . AAAI, page 7691-7700. AAAI Press, (2022)