From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Accuracy-Privacy Trade-off in Deep Ensemble: A Membership Inference Perspective., , и . SP, стр. 364-381. IEEE, (2023)Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors., , и . SP, стр. 1143-1161. IEEE, (2021)Multipath TCP traffic diversion attacks and countermeasures., , , , и . ICNP, стр. 1-10. IEEE Computer Society, (2017)A Girl Has A Name: Detecting Authorship Obfuscation., , и . ACL, стр. 2235-2245. Association for Computational Linguistics, (2020)TrackerSift: untangling mixed tracking and functional web resources., , , , и . Internet Measurement Conference, стр. 569-576. ACM, (2021)WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking., , , , и . CoRR, (2021)WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking., , , , и . USENIX Security Symposium, стр. 2875-2892. USENIX Association, (2022)HARPO: Learning to Subvert Online Behavioral Advertising., , , и . NDSS, The Internet Society, (2022)DNN Model Architecture Fingerprinting Attack on CPU-GPU Edge Devices., , , , , и . EuroS&P, стр. 337-355. IEEE, (2022)Measurement and Early Detection of Third-Party Application Abuse on Twitter., и . WWW, стр. 448-458. ACM, (2019)