Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scalable Quantitative Verification For Deep Neural Networks., , , and . ICSE, page 312-323. IEEE, (2021)LPGNet: Link Private Graph Networks for Node Classification., , , and . CCS, page 1813-1827. ACM, (2022)SynGuar: guaranteeing generalization in programming by example., , , and . ESEC/SIGSOFT FSE, page 677-689. ACM, (2021)Unforgeability in Stochastic Gradient Descent., , , , and . CCS, page 1138-1152. ACM, (2023)SmashEx: Smashing SGX Enclaves Using Exceptions., , , , and . CCS, page 779-793. ACM, (2021)(Invited Paper) on the Security of Blockchain Consensus Protocols., , , and . ICISS, volume 11281 of Lecture Notes in Computer Science, page 465-480. Springer, (2018)Quantitative Verification of Neural Networks and Its Security Applications., , , , and . CCS, page 1249-1264. ACM, (2019)Practical Verifiable In-network Filtering for DDoS Defense., , , , , , and . ICDCS, page 1161-1174. IEEE, (2019)One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics., , , , , and . NDSS, The Internet Society, (2019)User-customizable Transpilation of Scripting Languages., , , , and . CoRR, (2023)