Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware., and . CoRR, (2018)Physical Adversarial Examples for Object Detectors., , , , , , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2018)Addressing Beacon re-identification attacks: quantification and mitigation of privacy risks., , , , , , , , , and 8 other author(s). JAMIA, 24 (4): 799-805 (2017)Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts., , , and . USENIX Security Symposium, page 1335-1352. USENIX Association, (2018)Formal Abstractions for Attested Execution Secure Processors., , and . EUROCRYPT (1), volume 10210 of Lecture Notes in Computer Science, page 260-289. (2017)Ad-versarial: Defeating Perceptual Ad-Blocking., , , , and . CoRR, (2018)The Space of Transferable Adversarial Examples., , , , and . CoRR, (2017)Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge., , , , , and . IACR Cryptology ePrint Archive, (2016)Advances and Open Problems in Federated Learning., , , , , , , , , and 48 other author(s). CoRR, (2019)SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning., , , , , , and . CoRR, (2019)