Author of the publication

A Learning-Based Approach to Reactive Security.

, , , , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 192-206. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust Mechanisms for Sponsored Search., and . EAI Endorsed Trans. Serious Games, 3 (10): e2 (2016)Chaining Algorithms for Alignment of Draft Sequence., , , , and . WABI, volume 3240 of Lecture Notes in Computer Science, page 326-337. Springer, (2004)Multi-Task Differential Privacy Under Distribution Skew., , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 17784-17807. PMLR, (2023)A Learning-Based Approach to Reactive Security., , , , , and . IEEE Trans. Dependable Secur. Comput., 9 (4): 482-493 (2012)Exploring Principled Visualizations for Deep Network Attributions., , , , and . IUI Workshops, volume 2327 of CEUR Workshop Proceedings, CEUR-WS.org, (2019)A modular correctness proof of IEEE 802.11i and TLS., , , , and . CCS, page 2-15. ACM, (2005)Estimating Training Data Influence by Tracing Gradient Descent., , , and . NeurIPS, (2020)On characterizations of truthful mechanisms for combinatorial auctions and scheduling., and . EC, page 38-47. ACM, (2008)Estimating Training Data Influence by Tracking Gradient Descent., , , and . CoRR, (2020)Is Shapley Cost Sharing Optimal?, , , and . SAGT, volume 4997 of Lecture Notes in Computer Science, page 327-336. Springer, (2008)