Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning., , , , , and . CCS, page 1212-1226. ACM, (2023)COINN: Crypto/ML Codesign for Oblivious Inference via Neural Networks., , , and . CCS, page 3266-3281. ACM, (2021)RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression., , , and . NDSS, The Internet Society, (2023)AccHashtag: Accelerated Hashing for Detecting Fault-Injection Attacks on Embedded Neural Networks., , and . ACM J. Emerg. Technol. Comput. Syst., 19 (1): 7:1-7:20 (January 2023)Machine Learning-Assisted E-jet Printing of Organic Flexible Biosensors., , , , , , and . CoRR, (2021)CuRTAIL: ChaRacterizing and Thwarting AdversarIal Deep Learning., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (2): 736-752 (2021)AutoRank: Automated Rank Selection for Effective Neural Network Customization., , and . IEEE J. Emerg. Sel. Topics Circuits Syst., 11 (4): 611-619 (2021)Assured deep learning: practical defense against adversarial attacks., , , , and . ICCAD, page 20. ACM, (2018)Trojan Signatures in DNN Weights., , , , and . ICCVW, page 12-20. IEEE, (2021)SWNet: Small-World Neural Networks and Rapid Convergence., , and . CoRR, (2019)