Showing 361–380 of 468 results
/ Date/ Name
Oct 18, 2021Conditional De-Identification of 3D Magnetic Resonance ImagesOct 7, 2021The Connection between Out-of-Distribution Generalization and Privacy of ML ModelsSep 23, 2021Finite-key Analysis for Quantum Conference Key Agreement with Asymmetric ChannelsSep 17, 2021SaCoFa: Semantics-aware Control-flow Anonymization for Process MiningSep 13, 2021Formalizing and Estimating Distribution Inference RisksSep 6, 2021Coherent one-way quantum conference key agreement based on twin fieldJul 18, 2021As Easy as 1, 2, 3: Behavioural Testing of NMT Systems for Numerical TranslationJul 14, 2021A Distance Measure for Privacy-preserving Process Mining based on Feature LearningJun 17, 2021DroidMorph: Are We Ready to Stop the Attack of Android Malware Clones?Jun 7, 2021Formalizing Distribution Inference RisksMay 27, 2021Causally Constrained Data Synthesis for Private Data ReleaseApr 27, 2021Deep 3D-to-2D Watermarking: Embedding Messages in 3D Meshes and Extracting Them from 2D RenderingsApr 26, 2021Improving Botnet Detection with Recurrent Neural Network and Transfer LearningApr 13, 2021Thief, Beware of What Get You There: Towards Understanding Model Extraction AttackMar 12, 2021Private Cross-Silo Federated Learning for Extracting Vaccine Adverse Event MentionsJan 20, 2021LowKey: Leveraging Adversarial Attacks to Protect Social Media Users from Facial RecognitionNov 22, 2020TaiJi: Longest Chain Availability with BFT Fast ConfirmationOct 30, 2020State sharding model on the blockchainSep 25, 2020A formal model of Algorand smart contractsSep 23, 2020Pocket Diagnosis: Secure Federated Learning against Poisoning Attack in the Cloud